Please turn on your JavaScript for this page to function normally.
Google to fix Android flaw

Two days ago, a group of German scientists made public the fact that a Google authentication protocol flaw. The flaw makes it possible for malicious individuals to sniff out …

SCADA flaws talk cancelled due to security fears

Since the advent of the Stuxnet worm, SCADA industrial control systems have been receiving a lot of attention. You would expect that since these systems are those that control …

Mac Protector: Fake AV targets Mac OS X users

A little over two weeks have passed since the appearance of MAC Defender, the fake AV solution targeting Mac users. And seeing that the approach had considerable success, it …

Stolen credit card numbers advertised via Twitter

You would expect online criminals to want to keep a low profile and restrict their attempts of selling stolen wares to shady online criminal forums, but every once in a while …

Journalist arrested for article on Facebook privacy flaw

Australian journalist Ben Grubb was arrested yesterday following the publication of an article he wrote about a demonstration of how to access Facebook photos even if they are …

Facebook scam uses fake YouTube CAPTCHAs

It seems sometimes that Facebook survey scams alternate between just to types of lures: “See you views your profile” and “OMG! I can’t believe …

HADOPI stops monitoring for copyright infringement due to breach

Trident Media Guard – the company tasked by the French High Authority for the Dissemination of Works and Protection of Rights on the Internet to monitor P2P networks and …

Facebook survey scam with a twist

Facebook survey scams that lure in users with promises of being able to see who looks at their profile are nothing new, but here is one that has some unusual twists and merits …

Two teenage GhostMarket members sentenced

Two UK teenagers who stole credit card details from a number of online casinos, betting companies and web hosting companies and sold them on the now defunct GhostMarket have …

Google authentication protocol flaw endangers Android users

If you’re an Android user that has still not upgraded to the 2.3.4 and 3.0 version, you’re in danger of having the information contained in various Google …

New Alureon variant improves on old evasion techniques

The Alureon Trojan (also known as TDL, TDSS and Tidserv) has been around since 2007, and it’s function consist mainly in allowing the attacker to intercept incoming and …

Trojan paves way for rogue defragmenter

You might have heard about rogue AV solutions and scareware, but not many people have experienced a rogue defragmenter that hides files and (indirectly) asks money to return …

Don't miss

Cybersecurity news