Please turn on your JavaScript for this page to function normally.
A closer look at ESET Online Scanner

ESET Online Scanner is a free online tool for detecting and removing malware from any PC by using only your web browser – there is no need to install anti-virus …

Zbot Trojan uses Amazon cloud

There is a new variant of the Zeus/Zbot Trojan out there that takes advantage of Amazon’s EC2 services for command and control purposes of the botnet. CA’s threat …

Top 10 botnets and their impact

Every day, approximately 89.5 billion unsolicited messages (i.e. spam) are sent by computers that have been compromised and are part of a botnet. Botnets – apart from …

FIFA World Cup related scams

It should be universally know by now that hot news and big events are almost always used by spammers, phishers and peddlers of scareware to reach the widest audience possible. …

Fake fingerprint fools biometric devices

Japan saw its first case of biometric fraud come to light when they arrested Lin Rong, a 27-year old Chinese woman, on account of her faking a marriage to a Japanese man. BBC …

Spam speaks Irish

Dermott Harnett, principal analyst in Symantec‘s antispam engineering department notifies us of some unusual spam emails. Spammers – using online translators …

Looking back at spam in 2009

At the end of last year, it was predicted spam volumes would rise slightly higher than 95 percent in 2009 because of a growing use of botnets. Let’s see if the …

Koobface worm on Facebook: The Christmas trick

Almost a month ago, TrendLabs detected a new Koobface worm component that makes Internet Explorer create Facebook accounts, join random Facebook groups, add friends, post …

iPhone data harvesting from non-jailbroken devices

Nicholas Seriot, a HES software engineer and iPhone developer and trainer held a presentation 2 days ago in Geneva. The subject of the talk was iPhone privacy. He demonstrated …

Feds sued for withholding social network surveillance info

The Electronic Frontier Foundation, an international non-profit organization that is dedicated to the preservation of civil liberties related to the use of the Internet and …

Handing your encryption key to authorities: US vs. UK law

Two years ago, a US federal judge decreed that a criminal defendant can’t be coerced into giving up the encryption key to his encrypted hard drive because that would …

Wall Street Journal website vulnerable to SQL injection

A Romanian security researcher that goes by the handle “Unu” has made public his latest conquest. He managed to gain access to databases of the The Wall Street …

Don't miss

Cybersecurity news