Please turn on your JavaScript for this page to function normally.
Cryptome.org shut down for exposing MS surveillance guide

Cryptome, the whistleblower site that serves as a repository for “documents for publication that are prohibited by governments worldwide, in particular material on …

SEO poisoning reaches a new level

To improve the chances of installing their malware on random computers, scareware peddlers have decided to set up more that 60 websites that contain hundreds of possible …

End users are the main targets of online attacks

A report about the state of the Web by Zscaler indicates that cyber criminals have transferred the focus of their attacks from web and email servers to end user systems. Their …

Beware of the fake FBI fingerprint scanner

According to information popping up in some online forums, an application that supposedly allows you to enter and search the FBI fingerprint database will be released in a few …

Phishing spam from “Bank of Nevada”

What seemed like a typical phishing email was received by TrendLabs for analysis, but turned out to be just a ploy to get users to visit a malicious site with adult content. …

US unable to win a cyber war

The inability to deflect even a simulated cyber attack or mitigate its effects shown in the exercise that took place some six days ago at Washington’s Mandarin Oriental …

Intel admits to being targeted in January attacks

Among the 34 companies that have been targeted by “sophisticated” attacks in January was Intel. The fact was acknowledged in the company’s annual report for …

IT firm falls victim to online bank fraud, loses $100,000

The latest company to fall victim to a plundering of their account by the hands of cyber criminals is Cynxsure, an IT consultancy firm based in New Hampshire. The criminals …

Windows Live ID phishing spam

Joe Wilcox warns of what seems to be an attempt to phish his Windows Live ID and password. Here is the contents of the email purporting to come from the “Windows Live …

The need for global cooperation on cyber security

When the Internet was in its teens, it was hard to imagine it evolving as far as it has. Yesterday I was chuckling over an article from 1995 in which the author adamantly …

Phishers target Blogger users

Users of Google’s Blogger, a free blog publishing tool, are the targets of the latest phishing email campaign: The text of the message couldn’t be simpler, and the …

Warrantless cell phone tracking on the horizon?

There is no doubt about the fact that real time or historical tracking of criminals’ movement via their cell phones can come really handy to law enforcement officers. It …

Don't miss

Cybersecurity news