Please turn on your JavaScript for this page to function normally.
Money mules wanted

Reading about people unwittingly becoming money mules for cybercriminals, a lot of people wonder if they would be able to spot if the offer they received or searched for is …

A closer look at Tiptoe for Mac OS X

Zenopolis’ Tiptoe is a privacy application for Mac OS X that provides you with a “private browsing” like feature to all sorts of applications and to remove …

New Yahoo! Messenger worm spotted

You’ve have all probably been already told a hundreds of times to be careful when clicking on links in unsolicited emails and messages. But, what you also need to know …

Latest scams and how to avoid them

Over the years, we have come to rely on the Internet to fulfill many of our needs – the need to keep in touch with our friends and colleagues, the need to save time and …

Mobilizing a community to fight malware

The word about Immunet’s free anti-virus solution is spreading fast. The agent installed on my computer tells me that there are currently 162,597 people in the Immunet …

Forged checks pass flawed examination process

The recent cases of two Texan women who had their personal information and checking account numbers stolen and used to validate bogus checks, have brought into the spotlight a …

Trojan disguised as a toolbar for Facebook

A Facebook toolbar is just what you need to make your sharing and connecting with friends easier, says in an email supposedly coming from “Facebook.com”: If you …

Fake Amazon “Deal of the Day” emails doing rounds

Fake Amazon newsletters have lately become regular visitors in inboxes around the world, says Trend Micro. With “Amazon.com Deal of the Day” in the subject line, …

A possible solution for banking Trojans?

ZeuS, Spy Eye, Mariposa – these are just some of the many information-stealing Trojans out there. ZeuS is, hands down, the most prominent. Its longevity is assured by …

European privacy concerns regarding U.S. policies

There are a lot of people in Europe who feel that governments and companies should not be able to collect information of individuals so they can use it in ways that violate …

Fake Twitter email continues to plague inboxes, leads to malware

Almost a week ago, Twitter began warning its users about fake Twitter Support emails. Since then, a couple of variants of the email have surfaced, with small differences in …

The Storm botnet strikes again

Once upon a time, the Storm botnet was responsible sending out 20 percent of all spam, but was eventually crippled by the rise of new malicious software removal tools. By the …

Don't miss

Cybersecurity news