Please turn on your JavaScript for this page to function normally.
Stolen flash drive with sensitive financial info

Another example that demonstrates the need to follow security policy when it comes to keeping personal and financial information handled by businesses and organizations secure …

Android game hides spying application

If you have a game called Tap Snake on your Android handset and you weren’t the one who installed it, you are probably getting spied on by someone who had physical …

7-character passwords soon to be hopelessly inadequate

The increasing processing power and the growing number of processors on graphic cards will soon make 7-character passwords “hopelessly inadequate” to withstand …

Courier service customers targeted by phishing web sites

Customers of well-known courier services are often targeted by cybercriminals. Sometimes they try to make them open malicious files attached in emails with the excuse of …

5 million domains serving malware via compromised Network Solutions widget

A recent rise in the number of Armorize’s customers’ sites getting flagged by their own drive-by downloads and zero-day malware threats detection service HackAlert …

Who is the typical Russian hacker?

Security analyst Fyodor Yarochkin and a senior researcher from security firm Coseinc that calls himself “Le Grugq” have spent 6 months on various Russian web …

Geotagging risks and solutions

The ubiquitous automatic geotagging of pictures taken with smartphones and digital cameras and then posted on the Internet could prove to be a real security risk. Here’s …

Spamhaus disputes with Latvia’s top-level domain registry over blocked IP ranges

An email and open letter spat between anti-spam organization Spamhaus and NIC.LV, Latvia’s top-level domain registry has brought attention to the fact that .lv web …

3,000 online banking customers robbed through targeted ZeuS attack

It took only a month to compromise some 3,000 private and business accounts with one of the largest financial institutions in the U.K., warns M86 Security in its latest white …

Fake Malicious Software Removal Tool peddles fake AV

A fake Malicious Software Removal Tool using the actual icon of the legitimate software has been spotted by Trend Micro researchers. Even a first glimpse of the scanning alert …

A closer look at MacCleanse

MacCleanse (v. 2.0.6) is a small application that safely erases caches, logs, cookies, histories, and more. It provides detailed information on each item it cleanses, and can …

First SMS Android Trojan

The first SMS Trojan made specifically for smartphones running Google’s Android OS has been detected by Kaspersky, and it seems that quite a few devices have been …

Don't miss

Cybersecurity news