Please turn on your JavaScript for this page to function normally.
Malware through hardware still around

Following the security fiasco that was the shipping of a HTC Magic phone complete with pre-installed malware, one would think that Vodafone could come up with a better excuse …

Malicious ads on email service lead to malware

If you haven’t yet disabled JavaScript on your browsers, it’s high time to do it. TrendLabs warns about malicious advertisements popping up for users visiting a …

Feds on social networks: What can they do?

Should law enforcement agents be allowed to go “undercover” on social networks and collect information about the suspects? In the real, physical world, they …

20 critical Apple vulnerabilities to be revealed

Charlie Miller, the security researcher renowned for hacking Apple products during many a hacking competition, will be making public (at the CanSecWest security conference …

Fake PIN pad units in US chain store

As soon as we got used to the idea that we have to be very careful when using ATMs because they might be “skimming” devices attached onto them, we have to …

Chrome unique IDs removed after first update

Google decided to appease privacy advocates by making the “unique ID” feature “disappear” when the Chrome browser checks for updates for the first time …

Facebook removes “stalker” apps

A short-lived resurgence of “stalker” applications was promptly squashed by Facebook a few days ago when many users received notifications or wall posts from their …

Mac OS X ransomware – just a matter of time?

For years now, IT experts have been predicting the advent of threats to Mac users that would mirror those faced by the Windows-using crowd. While Mac malware does exist, and …

Vast online data leak in South Korea

South Korean retailer Shinsegae and 24 other companies have been breached and private data on 20 million customers has been stolen, forcing the Ministry of Public …

The rise of amateur-run botnets

It used to be that cyber criminals were people with a highly technical skill set, but this is not the norm anymore. This fact became obvious some two weeks ago when news of …

News of Corey Haim’s funeral lead to fake AV

Corey Haim’s death is old news by now, but fans of the prematurely deceased teen idol are still on the lookout for information concerning his death. Those interested in …

The threat landscape is changing, AV fails to adjust

A recent testing conducted by NSS Labs presented us with some deplorable results: of the seven antivirus products tested two weeks after the IE bug used for breaching Google …

Don't miss

Cybersecurity news