Please turn on your JavaScript for this page to function normally.
The future of identity verification through keystroke dynamics

When someone mentions biometrics, the first (and sometimes the only) thing that comes to mind to many people are physical characteristics on the basis of which people can be …

Cisco Firewalls

There used to be a time when firewalls were considered a full proof solution for protecting networks, and that time is long gone. History has taught us there are no silver …

The malware behind an “indestructible” botnet

It took only three months for the TDL rootkit – also known as Tidserv, TDSS and Alureon – to add over 4,5 million infected computers to the developers’ …

Gmail to improve phishing email detection

Google has decided to introduce a small but hopefully effective change in the way it presents Gmail user with received emails. Starting from now, every time a user receives an …

Anonymous leaks new batch of government and company data

Anonymous has made available for download another batch of data, including those belonging to the Zimbabwean government, Mosman Municipal Council, Universal Music Group …

“Credit card overdue” spam carries malware

Spam emails seemingly coming from a credit card company have been hitting inboxes and trying to scare users into downloading and running the attached malicious file: According …

Phishing operation organizer sentenced

27-year old Kenneth Joseph Lucas II has been sentenced to 13 years in prison for having organized the phishing operation shut down by the FBI in October 2009. Dubbed Operation …

FBI search for LulzSec hackers leads to Iowa woman

Government and law enforcement agencies’ efforts to discover who is behind the recently disbanded LulzSec have increased as Operation AntiSec still goes strong. And …

EA password reset due to LulzSec hack?

Electronic Arts (EA) customers have been receiving emails from the company notifying them that their passwords have been reset “to ensure account security”. Graham …

Bitcoin-mining Trojan spotted

Bitcoin has received lately a lot of attention from users and from the media, so it’s no wonder that cyber criminals have also figured out ways to take advantage of its …

Solution for Popureb rootkit infection

Bootkits are kernel-mode rootkit variants that hide in the computer’s master boot record (MBR) and are notoriously difficult to spot and, sometimes, to eradicate. …

Hackers publish stolen PayPal login credentials

LulzSec has been assimilated back into Anonymous, but their AntiSec campaign keeps going. It seems that their final wish has been granted for now, and other hacking groups …

Don't miss

Cybersecurity news