Please turn on your JavaScript for this page to function normally.
Spammers using new URL obfuscation technique

Spammers and scammers are always on the lookout for new tricks to use to bypass URL filters and deliver the links to unsuspecting victims, and lately they have discovered that …

Twitter “wrong credential combination” phishing scheme

If you have followed a link on a Twitter message from a contact that says “You have to be the first to see these new pictures!! LINK” and entered you username and …

Are computer “health certificates” the answer for the botnet problem?

Back in March, at the RSA Conference in San Francisco, Corporate Vice President for Trustworthy Computing at Microsoft Scott Charney proposed to the audience and to the world …

Infamous Canadian Pharmacy spam affiliate program shuts down

When it comes to spam, we’re all used to rising numbers – and the rising annoyance. But it seems that there could finally a reason to rejoice: it looks like …

A phishing e-mail to learn from

A phishing attempt that makes even people who are very good at spotting them pause for a moment and take a good look is a perfect example on which to learn. Ravi Dehar of …

A closer look at Knox for Mac

Knox (v. 2.0.5) is a Mac application that will allow you to create password-protected and encrypted vaults on your computer or to turn an external drive into one in order to …

Web-voting option suspended due to a system flaw

The option of casting your vote through the new D.C.’s Digital Vote by Mail system has been suspended because of a vulnerability that allowed a public tester of the …

Alleged leader of carding gang arrested

A Ukranian national suspected of being the leader of a gang involved in counterfeiting payment cards has been taken into custody by the Russian police. The arrest has been …

Cryptome hacked, founder e-mail account ransacked

Cryptome.org, the well-known whisteblowing site, was hacked during this past weekend, and all of its content (approximately 7GB of data) was deleted by the hacker who then …

Fake browser updates deliver fake AV or exploit kit

Not that long ago, Microsoft was warning users about rogue AV peddlers using compromised websites and fake browser warnings to urge them to download an …

Security exercise for information infrastructure protection

“Cyber Europe 2010” – the first pan European CIIP (Critical Information Infrastructure Protection) exercise that will test the efficiency of communication …

Arrests of money mules follow ZeuS gang takedowns

Last week’s arrests and indictments of two gangs (one based in the U.K. and one in the U.S.) that used the ZeuS Trojan to syphon huge amounts of money from private and …

Don't miss

Cybersecurity news