Please turn on your JavaScript for this page to function normally.
Exploit kit with integrated AV checker

The latest version of the relatively new “Siberia Exploits Kit” has an interesting feature that must make it pretty popular among criminals – a built in AV …

WikiLeaks and Assange under attack

While WikiLeaks’ site is still being bombarded with requests at a speed of 10 gigabits per second – making access to it very difficult and at moments even …

Amazon profiles abused by spammers and malware pushers

Experience has proven that if a site enables users to contribute content, this feature will be abused by those who want to push their own agenda – usually spammers. This …

Facebook’s recurring nuisance – the recycled scam

Every now and then, a new Facebook scam pops up that takes advantage of the users’ curiosity and lures them in by promising to allow them to view who has visited their …

Malicious Kodak Galleries used for serving Trojan

A variant of a highly specialized Trojan has appeared on fake sites mimicking Kodak Gallery pages, where potential victims are urged to download software that would supposedly …

Ransomware abounds

Ransomware is any malware that manages to make a computer system or any of the files on it inaccessible to the user and asks him or her to pay up if they want to regain …

Behavior of Safari on the iPhone could benefit scammers

A behavior of the Safari browser on the iPhone could be used by phishers and scammers to fool users into believing they have landed on a legitimate site, says Nitesh Dhanjani. …

Fake Trojan Removal Kit runs ThinkPoint rogue

When looking for an anti-malware solution, it pays to be extra careful. Take the example of the “Trojan Removal Kit”. It is offered on fake security scan pages …

Experiment reveals how scammers earn huge money with simple scams

An interesting experiment conducted by UK-based scam-tracking organization Scam Detectives has revealed how online scams can earn scammers a lot of money in a short time …

Android browser flaw allows attackers to access user data

A vulnerability in the Android browser that could allow attackers to download files stored on the mobile device’s or tablet’s SD card has been discovered by …

Fake Facebook “photo comment” e-mail leads to malware

As Facebook has announced its new messaging system and its deployment in the coming months, online scammers have been trying to use that announcement against unsuspecting …

Release of diplomatic cables reveals Aurora attacks instigator

As Wikileaks was preparing to release part of the 250,000 diplomatic documents on Sunday, its operators alerted the public via their Twitter account that the whistleblowing …

Don't miss

Cybersecurity news