Please turn on your JavaScript for this page to function normally.
Windows 0-day circumvents UAC

Windows zero-day vulnerabilities are lately getting discovered too often for Microsoft’s – and users’ – liking. Unfortunately for all of us, details of …

Kids lured to scam site by promises of parental control bypassing

The latest scam to hit Facebook users is one that supposedly offers a completely free proxy service for those who want to bypass parental controls and blocks set up by schools …

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ninja Hacking is not your typical "hacking" book. By comparing hackers with ninjas, the authors try to demonstrate how the ninja way of doing things can be translated to fit …

Two indicted for university hack binge

Two former students of the University of Central Missouri have been charged with computer intrusion, intercepting electronic communication and aggravated identity theft, …

Korean cross-border attacks exploited to spread malware

The recent cross-border shellings between North and South Korea have left many people wondering what has been going on and what triggered the attacks, and scareware and …

PacketWars: A cyber security sport for a cyber age

In this day and (cyber)age, hacking contests are sprouting like mushrooms after the rain – and it’s a good thing they do. For what better venue is there for …

Former Ford employee stole company secrets worth millions

An interesting case of theft of industrial trade secrets was unveiled yesterday as news that the culprit – one Xiang Dong (“Mike”) Yu – has pleaded …

Multiply users urged to download disguised malware

Users of the Multiply social networking site have lately been targeted with malicious personal messages coming from accounts opened by cybercriminals. The message implies that …

Exploit code for still unpatched 0-day used by Stuxnet released

After Stuxnet hit, it was discovered that it took advantage of four previously unknown Windows zero-day vulnerabilities to spread and compromise targeted systems. Three of …

Malaysian hacker breached Federal Reserve and DoD contractor networks

When agents arrested Malasyian Lin Mun Poo on account of selling US$1,000 worth of stolen credit card numbers just hours after he arrived in the U.S., they probably …

Are malware hybrids the next big threat?

Recent encounters with hybridized malware files have left Trend Micro researchers wondering if they have been designed that way or if they are just an undesirable side effect …

Will the DHS receive authority over private sector networks?

A bill that would give the U.S. Department of Homeland Security the power to impose federal cybersecurity standards on private sector companies whose flawless functioning is …

Don't miss

Cybersecurity news