Please turn on your JavaScript for this page to function normally.
WikiLeaks booted from Amazon, Assange to be arrested soon

While a “hacktivist” that goes by the handle of The Jester has claimed responsibility for the DDoS attack aimed at the WikiLeaks’ page via his Twitter …

ProFTPD.org main FTP server compromised

A warning has been issued by the developers of ProFTPD, the popular FTP server software, about a compromise of the main distribution server of the software project that …

Phishers exploit Facebook features

Phishing e-mails supposedly coming from the Facebook Security Team with account deactivation warnings have been hitting inboxes around the world. The targeted users are led to …

Chrome sandboxes Flash Player

It’s good news for Windows users – Chrome developers have added a Flash Player sandbox to the development channel of the browser, adding to the already present …

Exploit kit with integrated AV checker

The latest version of the relatively new “Siberia Exploits Kit” has an interesting feature that must make it pretty popular among criminals – a built in AV …

WikiLeaks and Assange under attack

While WikiLeaks’ site is still being bombarded with requests at a speed of 10 gigabits per second – making access to it very difficult and at moments even …

Amazon profiles abused by spammers and malware pushers

Experience has proven that if a site enables users to contribute content, this feature will be abused by those who want to push their own agenda – usually spammers. This …

Facebook’s recurring nuisance – the recycled scam

Every now and then, a new Facebook scam pops up that takes advantage of the users’ curiosity and lures them in by promising to allow them to view who has visited their …

Malicious Kodak Galleries used for serving Trojan

A variant of a highly specialized Trojan has appeared on fake sites mimicking Kodak Gallery pages, where potential victims are urged to download software that would supposedly …

Ransomware abounds

Ransomware is any malware that manages to make a computer system or any of the files on it inaccessible to the user and asks him or her to pay up if they want to regain …

Behavior of Safari on the iPhone could benefit scammers

A behavior of the Safari browser on the iPhone could be used by phishers and scammers to fool users into believing they have landed on a legitimate site, says Nitesh Dhanjani. …

Fake Trojan Removal Kit runs ThinkPoint rogue

When looking for an anti-malware solution, it pays to be extra careful. Take the example of the “Trojan Removal Kit”. It is offered on fake security scan pages …

Don't miss

Cybersecurity news