Please turn on your JavaScript for this page to function normally.
34 SCADA vulnerabilities revealed

It is safe to say that the existence of SCADA (supervisory control and data acquisition) systems was a fact unknown to many before the advent of the Stuxnet worm, and not many …

Google blames China for Gmail service disruptions

It seems that the active exploitation of the MHTML vulnerability that Google’s Security Team reported on earlier this month has a lot to do with recent attempts by the …

Outdated law makes wireless hacking acceptable

A ruling handed out earlier this month in The Netherlands set a precedent that will allow the nation’s citizens to “piggyback” on open WiFi networks and to …

Japanese tsunami videos lead to malware

A new Japanese disaster themed campaign is doing the rounds of inboxes. The e-mails supposedly offer links to videos about “The village that escaped the tsunami”, …

Rustock botnet downed by Microsoft

As many security companies and experts noted in the last few days, the activities of the Rustock botnet came to a standstill. They speculated about the reason behind this …

RSA hacked, SecurID users possibly affected

In an open letter, Art Coviello, the executive chairman of RSA (the security division of EMC), made public the fact that the company has suffered a breach and data loss …

A closer look at MacKeeper

MacKeeper (v1.0.3.) is a comprehensive bundle of various system utilities that will help you keep your Mac secure from malware; find it if it gets stolen; backup, restore, …

Google extends SSL to developer facing APIs

Firesheep‘s authors can be the satisfied with the gradual migration towards SSL that most of the biggest social networks, search engines, online shops and others have …

Low-tech approach to ATM heist

ATM thieves in San Francisco have adopted an unusual and very low-tech way of getting their hands on some money. According to The SF Examiner, they simply glue down the …

Phishing HTML attachments bypass browser detection

In the constant war that goes on between online crooks and scammers and security professionals, adaptability is a quality greatly prized by all. All of them are tied together …

Japanese “miracle survival” Youtube scam clips

Online scams taking advantage of the ongoing Japanese tragedy are popping up daily. The latest one spotted is perpetuated on YouTube, where users go to search for videos that …

Twitter spambots advertise “Radiation health” e-book

The earthquake/tsunami/nuclear reactor explosion situation in Japan is currently being exploited by cyber scammers in a great variety of ways, but among the things that I …

Don't miss

Cybersecurity news