Please turn on your JavaScript for this page to function normally.
The aftermath of the Bredolab botnet shutdown

The war against botnets will be long and hard – there is no doubt about it. For one thing, command and control centers can be replaced and the targeted botnet …

Fake AV pushers poison US election search results

The US midterm elections are taking place today, and scareware pushers aren’t sitting with their hands crossed – they have poisoned related search results: Search …

Spying app kicked out of Android Market

Secret SMS Replicator, a spying application that forwards contents of a user’s text messages to the phone of the person who installed it in the first place, has been …

RIAA’s sites downed by Anonymous DDoS attack

Anonymous continues its Operation Payback and has DDoSed two official websites belonging to the Recording Industry Association of America. Riaa.com and riaa.org have been …

Facebook discovers and “punishes” UID-selling developers

The recent discovery that some Facebook application were inadvertently forwarding users’ UIDs to advertising agencies and data collection companies has spurred the …

New DDoS Trojan used for downing dissident sites

A new DDoS Trojan connected with a slew of attacks against Vietnamese blogs has been discovered by SecureWorks. Dubbed Vecebot, the Trojan drops three files into the …

One in five card holders use birth date as PIN

Remembering passwords may seem the biggest problem you have when managing your e-mail or social network account, but that’s only because you don’t really believe …

Obama Administration gets a “B” for cybersecurity

The Electronic Privacy Information Center released its annual Privacy Report Card for the Obama Administration and – when compared to last year’s results – …

A peek into Google’s anti-malware operation

Google goes to great lengths to secure its users from threats lurking on the Web, because a half-hearted effort would soon drive them out of business. But, during his …

Microsoft contemplating SSL for Bing

HTTP session hijacking as a possibility and tools to execute it have been around for more than half a decade, but it took an easy-to-use Firefox add-on like Firesheep to point …

Telstra’s blunder leads to massive data leak

It is yet unknown if it was a human or computer error that made Australian telecommunications and company Telstra send out letters containing personal information (name, phone …

New 0-day flaw in Flash Player exploited in the wild?

Bad news just keep piling on Adobe – it looks like there is a new zero-day vulnerability in their Flash Player that is being exploited in the wild. Its existence is …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools