Please turn on your JavaScript for this page to function normally.
SQL injection attack show-and-tell

SQL injection has, for a long time now, found its way to the top places of the list of favorite attack vectors of cyber criminals. Its popularity is, without a doubt, due to …

Microsoft cripples the Waledac botnet

A few days ago, Microsoft has requested and was granted a temporary restraining order that resulted in the takedown of 273 Internet domains that are believed to belong to …

Pros and cons of biometric authentication

In theory, biometrics are a great way to authenticate a user: it’s impossible to lose your fingerprint (barring the most gruesome of developments), you can’t …

The future doesn’t look bright for Google in China

Google’s announcement that it will leave China if the censoring of their search results continues seems not to have affected the Chinese government much. They have not …

A closer look at Comodo Dragon 1.0.0.5

Comodo Dragon is a recently released free Internet browser constructed on the open source Chromium Project browser. The installation process is simple and fast. You will be …

Cryptome.org shut down for exposing MS surveillance guide

Cryptome, the whistleblower site that serves as a repository for “documents for publication that are prohibited by governments worldwide, in particular material on …

SEO poisoning reaches a new level

To improve the chances of installing their malware on random computers, scareware peddlers have decided to set up more that 60 websites that contain hundreds of possible …

End users are the main targets of online attacks

A report about the state of the Web by Zscaler indicates that cyber criminals have transferred the focus of their attacks from web and email servers to end user systems. Their …

Beware of the fake FBI fingerprint scanner

According to information popping up in some online forums, an application that supposedly allows you to enter and search the FBI fingerprint database will be released in a few …

Phishing spam from “Bank of Nevada”

What seemed like a typical phishing email was received by TrendLabs for analysis, but turned out to be just a ploy to get users to visit a malicious site with adult content. …

US unable to win a cyber war

The inability to deflect even a simulated cyber attack or mitigate its effects shown in the exercise that took place some six days ago at Washington’s Mandarin Oriental …

Intel admits to being targeted in January attacks

Among the 34 companies that have been targeted by “sophisticated” attacks in January was Intel. The fact was acknowledged in the company’s annual report for …

Don't miss

Cybersecurity news