cybercrime
New Zeus variant creates bogus Instagram accounts
If you are familiar with the results of a recently finished study regarding online content popularity that concluded that “likes” beget “likes”, the …
Advanced threats to drive growth in new product segment
As hackers have shifted their ultimate goals from disruption and notoriety to financial and intellectual property theft, the tactics they use have changed accordingly. The …
Lucrative business: cybercrime-as-a-service
With news of the struggling high street becoming a regular occurrence, it is not surprising that increasingly small businesses are seeking opportunities online. However …
Analyzing the Fort Disco bruteforce campaign
In recent months, several researchers have highlighted an uptick in bruteforce password guessing attacks targeting blogging and content management systems. Arbor ASERT has …
Advice on Tor use in wake of Freedom Hosting compromise
In the wake of the discovery that someone has compromised Tor hidden services hosted by Freedom Hosting and injected malicious JavaScript aimed at de-anonymizing specific …
Cybercriminals are doing a better job than the companies they target
What can you learn from reading the exploits of the most successful hacking ring ever brought to justice? Recently, the US Attorney’s Office in NJ unsealed their …
Russians responsible for 30% of mobile malware
Lookout investigated 10 Russian-based organizations, uncovering that the mobile malware industry in Russia has become organized and profitable. These malware businesses …
72k people affected by University of Delaware hack
University of Delaware is the latest of the high-learning institutions in the US to have been hit with a cyber attack that resulted in a data breach. According to a …
Security complexity and internal breaches are key concerns
Growth in external hacking attempts, DDoS and malware attacks, and internal threats to data are the key security concerns for UK businesses. 64% of respondents to a Check …
Apple Dev Center partially back online, still no details about the hack
Parts of the Apple Developer Center are back online after a week long outage caused by an unnamed intruder that has “attempted to secure” personal information of …
The future of phishing: Credit card redirection
Cyber crooks will go at great lengths to get their hand on users’ credit and debit card information. Usually they try to trick them with spoofed emails that lead to …
Stanford University suffers another data breach
Stanford University has suffered another IT breach, and while its scope is yet to be determined, all users of the university’s computer system are advised to change the …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act