Please turn on your JavaScript for this page to function normally.
Banking Trojan coming at you from all sides

Using the very effective tactic of multiple attack vectors, the makers of the Zbot banking Trojan are ensuring a high enough infection rate for them to make profit. A recent …

Pharma spam on forums near you

Forever searching for new ways to accost naive shoppers, fake and/or illegal on-line pharmacy sites have lately taken to forcing their ads on unsuspecting forum visitors. …

SASFIS Trojan treads lightly

The SASFIS Trojan variants may be not as famous and well-known as BREDOLAB’s or Zeus/Zbot’s, but they still pose a considerable danger to users and networks around …

Fear of stealth hackers

One of the biggest fears that software companies have is that someday hackers will manage to steal the source code of their products and modify it so that they can secretly …

Hiding from Google

Worried about Google tracking your online activity? Not satisfied with Tor’s speed? A (partial) solution to your problem has been set up by Moxie Marlinspike, a hacker …

Networks Solutions breached, hundreds of sites defaced

Network Solutions, the well-known U.S. hosting provider and domain registrar that manages over 6.6 million domain names, confirmed on Tuesday that their servers have been …

Google petitions for a EU security and privacy committee

As one of the reasons behind its practice of keeping users’ IP addresses and search histories Google mentions their use as tools for combating attacks such as the one …

Virus signature checksum risks

The notion of virus signatures is very easy for laymen to grasp if they stick to this analogy: anti-virus solutions detecting malware trying to pass itself as an innocuous …

Foursome fleeing from cyber fraud charges arrested in Mexico

Fleeing to Mexico to avoid prosecution for conspiracy to commit wire and mail fraud, four Texans were arrested last Friday in Cancun. Web Host Industry Review reports that …

Is data stored “in the cloud” protected by the Fourth Amendment?

The implementation of cloud computing by companies and individuals is rising slowly, but steadily. There will always be people who are ready to bear the risk of a new way of …

D-Link routers vulnerability allows hackers to reconfigure admin settings

Recently, SourceSec Security Research announced on its blog that they have discovered a vulnerability in D-Link routers that allows outsiders and insiders to access and edit …

South Korea preparing for cyber war

South Korea is determined not to be caught off guard again when it comes to cyber attacks directed against her. Mimicking the US defensive steps, the South Korea Ministry of …

Don't miss

Cybersecurity news