Please turn on your JavaScript for this page to function normally.
Web-voting option suspended due to a system flaw

The option of casting your vote through the new D.C.’s Digital Vote by Mail system has been suspended because of a vulnerability that allowed a public tester of the …

Alleged leader of carding gang arrested

A Ukranian national suspected of being the leader of a gang involved in counterfeiting payment cards has been taken into custody by the Russian police. The arrest has been …

Cryptome hacked, founder e-mail account ransacked

Cryptome.org, the well-known whisteblowing site, was hacked during this past weekend, and all of its content (approximately 7GB of data) was deleted by the hacker who then …

Fake browser updates deliver fake AV or exploit kit

Not that long ago, Microsoft was warning users about rogue AV peddlers using compromised websites and fake browser warnings to urge them to download an …

Security exercise for information infrastructure protection

“Cyber Europe 2010” – the first pan European CIIP (Critical Information Infrastructure Protection) exercise that will test the efficiency of communication …

Arrests of money mules follow ZeuS gang takedowns

Last week’s arrests and indictments of two gangs (one based in the U.K. and one in the U.S.) that used the ZeuS Trojan to syphon huge amounts of money from private and …

XSS flaws found on three security firms’ websites

A group of white-hat hackers has discovered various XSS vulnerabilities on websites belonging to three well-known security companies, and have reported it to the firms …

Seven Deadliest Wireless Technologies Attacks

Part of Syngress' "The Seven Deadliest Attack Series", this book introduces the reader to the anatomy of attacks aimed at wireless technologies and devices that use …

Plane-tracking phone app is a boon for terrorists?

An application for the iPhone and Android-running devices that allows users to establish the exact location of an airplane by simply pointing it in its direction while it …

Android applications sharing your data

A group consisting of researchers from Duke University, Pennsylvania State University and Intel Labs has recently created a tool that allowed them to analyze data flows out of …

Stuxnet related searches poisoned

It was only a matter of time when criminals would use the omnipresent Stuxnet threat to lure victims into downloading malware and, according to Trend Micro researchers, the …

Sasfis distibuted via fake U.S. Postal Service emails

If you have recently received an email from the United States Postal Service notifying you that a package you sent wasn’t delivered because the recipient’s address …

Don't miss

Cybersecurity news