Please turn on your JavaScript for this page to function normally.
Pwn2Own: iPhone and Blackberry hacked

On the second day of the Pwn2Own contest held at the CanSecWest conference, iPhone and Blackberry devices have been successfully exploited, while the scheduled Android and …

Spoofed reported attack pages lead to ransomware

Spoofed reported attack pages have been the lure of choice of fake AV and ransomware peddlers for quite some time now, so it shouldn’t come as a surprise that a recent …

Japan earthquake search results already poisoned

It didn’t take long for malware pushers to take advantage of Internet users’ hunger for news and videos from Japan after it was hit today by the most powerful …

Google Android security tool found repackaged with malware

In a what should actually not be a wholly unexpected turn of events, the Android Market security update – pushed to Android users whose devices where affected by one or …

Zeus toolkit with “ghost” panel for better evasion

The last version of the Zeus builder before author Monstr/Slavik gave up its source code to the author of the SpyEye toolkit is 2.0.8.9, and it’s still being offered on …

Should antivirus vendors block state malware?

The question was raised by security firm F-Secure after the news that documents found in the recently raided Headquarters of the Egyptian State Security revealed that its …

Pwn2Own: Safari and IE8 go down, Chrome’s attacker a no-show

The results of the first day of the Pwn2Own contest held each year at the CanSecWest conference are the following: Safari and IE8 went down, Chrome is still unscathed due to a …

Free, open source exploit kit offered online

Among the various exploit kits for sale out there it seems there is one that aspiring cyber crooks can use for free. Researchers from M86 have stumbled upon it by chance, and …

How can the author of an anonymous e-mail be identified?

When anonymous letters were written by hand, graphologists were called in to identify the likely author. In this day and age when most such mail is sent electronically, it may …

Will IPv6 render blacklisting obsolete?

We are all aware that IP addresses have almost run out. Security experts are debating the pros and cons, but the sad fact is the migration towards IPv6 is inevitable. Now it …

Student charged with operating grade fixing scheme

At first glance, a 19-year-old might seem like an unlikely criminal. A school’s salutatorian (a student that has the second-highest marks at graduation) with a 4.54 …

Illegal online pharmacies target mobile users

Malware authors have begun to set their sights on mobile device users, as witnessed by the latest Trojans made for Android-running devices, on official and unofficial online …

Don't miss

Cybersecurity news