cybercrime
Blackhole 2.0 is out with new exploits and same price
A new version of BlackHole, one of the most popular exploit kits out there, has been made available by its creator, who has supposedly rewritten it from scratch. BlackHole 2.0 …
Structured method to data breach analysis and response
Data breaches are growing in frequency and magnitude, and have a tremendous financial, legal, operational and reputational impact to the breached organization, whether …
French energy company targeted with faulty malware
A researcher of Norwegian security firm Norman has recently come across and analyzed a peculiar malware sample that was likely aimed at compromising computers of employees of …
Jump in mobile app and banking scams
In August, GFI threat researchers identified a number of high-profile fake mobile application scams, along with a spike in email scams targeting UK banking and government …
Pirate Bay’s Svartholm arrested for hacking, not piracy
Well, as it turns out, the recent arrest of Pirate Bay co-founder Gottfrid Svartholm in Cambodia is a consequence of a “crime related to information technology,” …
11,000 Guild Wars 2 accounts hacked in ongoing attacks
The second sequel of the popular Guild Wars multiplayer online RPG by ArenaNet has been released less than two weeks ago, and player accounts are already being heavily …
Arizona man goes to prison for selling access to botnets
Joshua Schichtel was sentenced to 30 months in prison for selling command-and-control access to and use of thousands of malware-infected computers. In addition to his prison …
Government warns businesses of cyber crime threat
The government’s spy agency, GCHQ, launched a programme that aims to help business leaders tackle the growing threat of cyber attacks. The program, dubbed Cyber Security …
Cybercrime costs consumers $110 billion
With findings based on self-reported experiences of more than 13,000 adults across 24 countries, the 2012 edition of the Norton Cybercrime Report calculates the direct costs …
Inmates breached prison system’s network
Inmates at the state prison in Concord, New Hampshire, have managed to connect the computers they use in the prison’s industries program to the prison system’s …
Virus shuts down gas company’s site and offices
The official website and the email servers of Ras Laffan Liquefied Natural Gas Company – the world’s second largest liquefied natural gas company which distributes …
Cybercriminals use throw-away domains to infiltrate enterprise networks
The first six months of 2012 saw continued increases of malicious infection activity and an intensified danger of email-based attacks as cybercriminals increasingly employed …
Featured news
Resources
Don't miss
- Crypto-stealing iOS, Android malware found on App Store, Google Play
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer