Please turn on your JavaScript for this page to function normally.
Bogus airline charge leads to Zeus Trojan

A recent spam campaign is targeting frequent users of a popular German airline carrier, baiting them with a exorbitant bogus fee that has apparently been charged to their …

Adobe changes Flash Player feature to prevent user tracking

In the last few years, Adobe has realized that their products will have no future if they don’t step up the security aspect, and so they started doing things like …

Raising the security bar: Know and fine-tune your IPS

A long time ago, people thought that having a firewall in place would protect their systems and networks from any and every outside attack. And for a very short while, they …

Third-party software responsible for most vulnerabilities

Most people owning a PC are familiar with Microsoft’s patching process – it’s easy and it’s there. For a lot of them, it also gives the impression that …

Who profits on vulnerabilities for sale?

The number of software vulnerabilities discovered during 2010 may be smaller than that of those discovered the previous year, but they still bring money to its discoverers. …

50,000 stolen iTunes accounts for sale in China

Some 50,000 iTunes accounts – each associated with an active credit card and some guaranteed to work for at least 12 hours before getting deactivated – are …

Mac App Store already cracked

The Mac App Store debuted yesterday, and it seems that a flaw has been found that allows you to get paid applications for free. Logan of AppInstect published a tutorial on how …

Estonia institutes volunteer cyber army

In 2007, when Estonia’s government, financial and media computer networks were attacked by unknown Russian hackers following the government’s decision of …

Undetectable fake ATM keyboard steals PINs in real time

Thieves and scammers are an inventive bunch, especially when it comes to stealing you money indirectly. And the latest discovery of a fake keyboard that is placed over an …

DHS investigation uncovers cyber fraud ring members

Two Winona State University students are currently being investigated by the Department of Homeland Security and are suspected of having been members of a Vietnamese-based …

Fuzzing tool discovers over 100 vulnerabilities in popular browsers

The public release of cross_fuzz – a cross-document DOM binding fuzzer that is able to detect vulnerabilities in all browsers by examining how they interact with various …

Exploit code for critical MS Office flaw exploit found in the wild

A critical vulnerability in the way Microsoft Office handles RTF which can allow an attacker to remotely execute arbitrary code on the victim’s computer has been by …

Don't miss

Cybersecurity news