Please turn on your JavaScript for this page to function normally.
XBox gamers, beware!

Various fake websites that purport to be hosting a XBox Live application have been detected by Sunbelt, but are actually intent on making you download and run a password …

Bank employee accused of stealing from “infected” ATMs

An employee of the Bank of America that was in charge of designing and maintaining the the bank’s computer system and its ATMs, was charged of committing computer fraud. …

Q&A: Cyber warfare

Geoff Harris is the President of the UK Chapter of the Information Systems Security Association (ISSA) a not-for-profit, international organization of information security …

Does single sign-on have a future?

Single sign-on has been for a while now lodged into many IT minds as a potential ideal solution for the issue of the forever-piling sign-in credentials. As people are …

Malicious shortened URLs on IM

Shortened URLs are not just for Twitter – their small footprint also lends itself beautifully to Instant Messaging. Unfortunately, even cybercriminals are now privy to …

Fake AV avatars from a single file

XP Antispyware 2010, Antivirus XP 2010, XP Guardian 2010 – XP Guardian, XP Defender 2010, XP Antivirus, XP Antivirus 2010, XP Internet Security, XP Internet Security …

Is phone phishing making a comeback?

By now, pretty much everyone knows that when one receives an email purportedly coming from a bank or a financial institution, extreme caution and distrust is in order. We have …

70 Romanian cyber crooks arrested

70 people belonging to 3 unconnected cybercrime gangs were arrested yesterday during raids performed by the Romanian police. The gangs m.o. was apparently as follows: they …

Facebook will not start charging users

“News” of Facebook’s plan to charge for the use of its network is once again surfacing and being propagated by users and Facebook groups set up (as it seems) …

Check how secure, private and open an app is

Surfing through the Net in search of a objective review of an application can be a daunting task, and even when you find one, it usually barely touches the issues of security …

iPad, iPhone “prizes” as lures for Twitter users

Not surprisingly, spam using the Apple iPad as a lure to get users to give up personal or credit card information has began to make rounds of Twitter users. Sunbelt reveals …

ZeuS vs. Zeus Killer

Back at the beginning of February, we wrote about the SpyEye toolkit and its author’s intention of encroaching upon Zeus toolkit’s turf by offering a feature that …

Don't miss

Cybersecurity news