Please turn on your JavaScript for this page to function normally.
Facebook scammers leverage the Amazon Cloud

Survey scams have been targeting Facebook users for longer that they would wish. The goal of all of them has always been to make users fill out survey, but the lures and …

Web attacks peak at 38,000 an hour

Web applications are subject to business logic attacks, according to a report by Imperva. Imperva monitored and categorized attacks across the internet targeting 40 different …

Compromised Tumblr accounts sporting fake Starbucks gift cards

It is a well known fact that compromised legitimate websites are often used by cyber crooks to drive traffic towards their scammy sites. The latest example of this practice …

Malicious QR codes and the persistence of rootkits

Cybercrime has come a long way since it was mostly a digital form of vandalism. It has developed into a criminal business operated for financial gain and is now worth …

Carberp Trojan targets French broadband subscribers

Last year, Carberp emerged on the online banking fraud scene as a competitor to the dominant financial malware platforms Zeus and SpyEye. Trusteer recently discovered a …

Researchers discover network of 7,000 typo squatting domains

A network of some 7,000 typo squatting domains is being used by scammers to effectively drive traffic towards their scammy sites, some of which get so much traffic that they …

Criminals stole $3.4B from online revenues in 2011

Merchants are making gains against fraud but the battle continues, according to CyberSource, a Visa company. The fraud rate by order (the percentage of orders that turned out …

Kelihos malware author, botnet herder named by Microsoft

Microsoft has named a new defendant in the ongoing Kelihos case. His name is Andrey N. Sabelnikov, of St. Petersburg, Russian Federation, and is believed to have written the …

Unique Web malware hosts increase

The proper security tools can prevent infection or stop outbreaks, mitigate or reduce losses from malicious events, and even decrease legal liability. These products can also …

Online reputation manager suspected of Illegal code injection

For individuals and companies that have a bad online reputation, online reputation management (ORM) services might sound like a good investment. Such services are not illegal, …

Koobface botnet goes down, suspects scurry to erase tracks

As the names of the five individuals believed to be behind the Koobface botnet were revealed on Tuesday, their reaction was almost immediate and seems to validate the …

Twitter users targets of social spear phishing

Thousands of businesses and consumers are putting themselves at risk each day by publicly revealing their email addresses on Twitter. Websense monitored Twitter in January and …

Don't miss

Cybersecurity news