Please turn on your JavaScript for this page to function normally.
Spying the spy: How to turn Trojans against criminals

“Researchers do vulnerability research on so many various application, why not to do it on this one?” asked himself Andrzej Dereszowski, founder and director of …

So, you bought a fake AV. What happens next?

A Sunbelt researcher has had the “fortune” of having a relative fall for the scam, which gave him the opportunity to take a peak at the process following the …

Mozy online backup service

Mozy (mozy.com) is an online/cloud backup service for consumers and small businesses. Read on to see how it performs.

Escalation of pharma spam from Gmail accounts

A recent noticeable upsurge of spam massages coming from compromised Gmail accounts has led the unfortunate victims to speculate that there is a bug in the Gmail mobile …

Google shines a light on government requests

Among all the search engines and ISPs around the world, Google has taken the first step towards transparency when they revealed their Government Requests tool on Tuesday: …

Fake AV doorway pages in the spotlight

Fake AV has become a regular fixture of the threat landscape for quite some time now, and TrendLabs experts take a closer look at the different tactics employed on the …

Google attack objective: Source code for the single sign-on system?

The January attacks on Google and other US companies may seem to us as if they have happened ages ago, but you can be sure that they are still actively involved in the …

Phishing student loans’ pages target students

University students in the UK that have taken out a loan with the Student Loans Company have lately been targeted by a phishing scam that presents to them a page that is …

Network Solutions customers targeted by new hack attack

Only a week after a number of blogs hosted on Network Solutions have been compromised thanks to a WordPress hack, the company has been thrust back into the spotlight by a …

Iceland volcano search results lead to fake AV

Eyjafj?¶ll, Eyjafjallaj?¶kull, Eyjafjalla, Eyjafjallajokull-¦ The Iceland volcano Eyjafjallaj?¶kull has been recently referred to by all those names in various media, …

Trojan disguised as Google Chrome extension

The announcement that Google Chrome is now the third most widely used browser wasn’t lost on cybercriminals. They follow the crowd, and that explains the recent …

9-year-old blamed for hacking school system

Searching for the hacker who broke into the computer system of Spring Hill Elementary in Virginia, the police was more than little surprised when the investigation revealed …

Don't miss

Cybersecurity news