Please turn on your JavaScript for this page to function normally.
“American guy must be stoned to death” Facebook scam spreads virally

The latest scam spreading virally on Facebook snares people by making them wonder why This American GUY must be Stoned to De@th for doing this to a GIRL: [LINK] or why This …

OpenBSD headman believes contractor tried to insert backdoors

Following last week’s accusation by a former government contractor that the FBI has implemented backdoors into the encryption software used by OpenBSD, Theo de Raadt, …

Fake iTunes e-mail leads to drive-by download

E-mails purportedly coming from iTunes and bearing “iTunes account may be suspended” in the subject line have been hitting inboxes in the last few days. …

“Evil” URL shortener initiates DDoS attacks

Can you believe that clicking on a shortened link can make you an involuntary and unknowing participant in a DDoS attack on a website? Ben Schmidt, a self-styled …

Worm blocks access to Facebook

A relatively new worm that Symantec named W32.Yimfoca presents a very interesting and never before seen modus operandi. A variant of the worm spreads via Yahoo! Messenger and, …

How can independent media and human rights sites defend themselves from DDoS attacks?

Thanks to the attacks executed by hacktivist group Anonymous against sites of companies that have (in their eyes) wronged WikiLeaks, the DDoS attack has once again become a …

Gawker’s future security plans revealed

An internal memo sent to the Gawker staff by Thomas Plunkett, Gawker Media CTO, has revealed further details about last week’s massive breach that resulted in the …

Database of routers’ embedded private SSL keys published

The recent publishing of a database containing over 2,000 private SSL keys hard-coded into various routers – with their corresponding public certificates and …

110,000 credit card records stolen in NY tour company web server breach

The web server of CitySights NY – a company that organizes tours around New York on double-decker buses – has been breached and names, addresses, e-mail addresses, …

Experimental botnet reveals long sought answers

Is there a better way of analyzing the ins and outs of a botnet than making one yourself? The answer to that question was negative for ESET’s researcher Pierre-Marc …

Google doesn’t want to share its encryption keys

Two years ago, the wish to have control over communication systems and the lack of technical resources of Indian intelligence agencies has led to a particular request targeted …

Vendor creates malware to sell its anti-malware product

Chinese antivirus software companies seem to have a unusual strategy for keeping its services and products in demand – secretly developing threats themselves and …

Don't miss

Cybersecurity news