Please turn on your JavaScript for this page to function normally.
Malicious shortened URLs on IM

Shortened URLs are not just for Twitter – their small footprint also lends itself beautifully to Instant Messaging. Unfortunately, even cybercriminals are now privy to …

Fake AV avatars from a single file

XP Antispyware 2010, Antivirus XP 2010, XP Guardian 2010 – XP Guardian, XP Defender 2010, XP Antivirus, XP Antivirus 2010, XP Internet Security, XP Internet Security …

Is phone phishing making a comeback?

By now, pretty much everyone knows that when one receives an email purportedly coming from a bank or a financial institution, extreme caution and distrust is in order. We have …

70 Romanian cyber crooks arrested

70 people belonging to 3 unconnected cybercrime gangs were arrested yesterday during raids performed by the Romanian police. The gangs m.o. was apparently as follows: they …

Facebook will not start charging users

“News” of Facebook’s plan to charge for the use of its network is once again surfacing and being propagated by users and Facebook groups set up (as it seems) …

Check how secure, private and open an app is

Surfing through the Net in search of a objective review of an application can be a daunting task, and even when you find one, it usually barely touches the issues of security …

iPad, iPhone “prizes” as lures for Twitter users

Not surprisingly, spam using the Apple iPad as a lure to get users to give up personal or credit card information has began to make rounds of Twitter users. Sunbelt reveals …

ZeuS vs. Zeus Killer

Back at the beginning of February, we wrote about the SpyEye toolkit and its author’s intention of encroaching upon Zeus toolkit’s turf by offering a feature that …

Fake gift card scams on Facebook

Whole Foods Market, a Texas supermarket chain, has been fighting the latest gift card scam that takes advantage of the company well-known brand by offering a $500 gift card to …

How to detect a phishing site, the Google way

Google analyzes millions of pages per day when searching for phishing behavior. This kind of activity is, of course, not done by people but by computers. The computers are …

Global response to Conficker threat: Model for future cyber threat response?

The problem with Conficker is that we still don’t know what it’s for. Yes, an estimated 7 million computers are infected worldwide, but they don’t show signs …

Silent auto-patching for Flash plug-in within Chrome

The exhausting, continuous patching of software will, hopefully, some day come to an end. I seriously doubt it will be because of flawless code, but the possibility of having …

Don't miss

Cybersecurity news