Please turn on your JavaScript for this page to function normally.
Facebook credentials phishing scheme

Trying to trick users into giving up their Facebook usernames (i.e. emails) and passwords by making them believe they have won a prize is a well-known tactic employed by …

New authorization process for Facebook apps

Ten months ago, when Facebook agreed to make some changes to its platform and add new privacy safeguards in order to comply with the requests made by the Canadian Privacy …

10,000 XP machines attacked through 0-day flaw

The Windows Help and Support Center vulnerability, the details of which have recently been made public by researcher Tavis Ormandy, is being heavily exploited in the wild. …

Elderly couple sent $512,000 to overseas scammers

In the Australian Transaction Reports and Analysis Centre’s annual report on crime typologies and case studies, there is a particular one that caught my attention: the …

Destination Hotels card processing system breached

When it comes to cyber attacks and breaches, the hospitality industry has been the most heavily targeted industry in 2009. The reason behind this increased criminal activity …

Spanish firm raided, allegedly sold software with built-in “logic bombs”

Following an anonymous tip submitted on the portal of the Spanish Guardia Civil’s division for hi-tech crimes, the investigators have raided the offices of an …

SSCP Video Mentor

Yet another title in the Pearson's series for interactive learning that targets users set on obtaining security certifications, SSCP Video Mentor is a combination of DVD and …

FBI fails to decrypt suspect’s hard drives – after 12 months of trying

After 12 months of failed attempts to crack the encryption that protects information held on 5 hard drives that belong to a Brazilian banker suspected of money laundering, the …

Cisco’s access point migration mode leaves networks vulnerable

A feature of Cisco’s Aironet 1200 Series Access Point can be abused by hackers to gain access to a company network, claim researchers from Core Security Technologies. …

A closer look at East-Tec Eraser 2010

East-Tec Eraser 2010 (v. 9.7) protects your privacy, identity and confidential information while removing all evidence of your computer and online activity. It erases your …

New site for Google’s encrypted search

When Google unveiled the option of encrypted use of its search engine, people were mostly satisfied. But schools and other educational institutions had a problem with this new …

Cyber criminals steal almost $400,000 using a Trojan

A few months ago, a small escrow firm from California was targeted by cyber criminals that managed to transfer almost $400,000 from the firm’s bank account to a number …

Don't miss

Cybersecurity news