Please turn on your JavaScript for this page to function normally.
US cyclist Floyd Landis wanted for hacking

Remember when back in 2006 U.S. cyclist Floyd Landis won the Tour de France, only to be stripped of the victory and banned from competing for two years after testing positive …

Shell’s employee database breached: 170,000 records compromised

Oil giant Shell was unpleasantly surprised when it received news of a database containing contact information of some 170,000 of their workers having been emailed to seven …

Fake hi5 invitation carries malware

TrendLabs warns about a malicious spam email campaign that supposedly comes from the popular social networking website and contains a message asking recipients to set up an …

Bank sued for not preventing online theft

Mirroring the lawsuit that a couple from California raised against the Bank of America, Comerica Bank is being sued by Experi-Metal Inc. (EMI), a manufacturing firm from …

Security consultant turned hacker sentenced to 13 years in prison

Max Ray Vision, a 37-year-old hacker from San Francisco, has earned himself a 13 year long prison sentence on account of stealing two million credit card numbers from banks, …

Fake AV with online support service

In the latest Symantec report on rogue AV software, covering a period of one year (July 2008-June 2009), there have been some 43 million installation attempts from over 250 …

Hackers steal $50,000, bank refuses to assume responsibility

Fan Bao and his wife Cathy Huang from Highland Park, California, were shocked when they were notified of two fraudulent money orders that were set to transfer money in the …

Lawful wiretap interfaces accessible to cyber criminals?

The lawful intercept architecture in Cisco Systems’ networking products has been examined and found wanting by Tom Cross, manager of IBM’s X-Force research team. …

Chip and PIN system on banking cards seriously flawed

A team of Cambridge computer researchers has discovered a flaw in the chip and PIN system used on most – if not all – credit and debit cards around the world. The …

Fake AV’s double attack

Fake AV is regularly at the top of the lists of peddled malware, and part of the reason it’s because it is spread in a many different ways: spam, compromised websites, …

Simulated cyber attack will test US Government response

An article in The Atlantic with the title “U.S. To Be Hit By Massive Cyber Attack On Feb. 16. Asterisk.” has set some readers to panic mode because they assumed it …

Hacking games: Key to finding cybersecurity talent

To catch a thief, you must think like a thief – the best way to defend an asset is to get inside the head of the attacker and predict his actions. That’s the …

Don't miss

Cybersecurity news