cybercriminals
The state of cyberwar in the U.S.
As a country that is used to being dominant in the more traditional sense, the U.S. has been working to come to grips with a new sense of supremacy as a result of cyber …
Compromised DreamHost-hosted websites lead to scams
Hundreds of websites hosted by DreamHost have been compromised and are used to redirect users to a Russian scam page, warns Zscaler. Whether or not this is the result of the …
Server-side polymorphic Android apps
Server-side polymorphism as a technique to serve unique malware versions that evade signature-based detection to Windows users is used by many malware peddlers on a regular …
VeriSign hack: Reactions from the security community
VeriSign admitted it was hacked in 2010 and cannot identify what data was stolen. Below are comments on the situation that Help Net Security received from industry veterans. …
Malware redirects bank phone calls to attackers
Trusteer have discovered a concerning development in some new Ice IX configurations that are targeting online banking customers in the UK and US. Ice IX is a modified variant …
Fake Tumblr Staff Blog offers still targeting users
A week ago, compromised Tumblr accounts were sporting fake messages from a “Tumblr Staff Blog” offering Starbucks gift cards in return for completing surveys and …
Compromised WordPress sites lead to Phoenix exploit kit
Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …
Keeping on top of financial malware
A lot of people are apprehensive about buying things and accessing their bank accounts online. It is an understandable fear, especially when one is aware that it takes just a …
Students used keyloggers on school computers, changed grades
Three Californian 16-year-olds have been arrested for having allegedly broken into their high school, stolen keys and tests, installed keyloggers onto teachers’ …
Facebook scammers leverage the Amazon Cloud
Survey scams have been targeting Facebook users for longer that they would wish. The goal of all of them has always been to make users fill out survey, but the lures and …
Web attacks peak at 38,000 an hour
Web applications are subject to business logic attacks, according to a report by Imperva. Imperva monitored and categorized attacks across the internet targeting 40 different …
Compromised Tumblr accounts sporting fake Starbucks gift cards
It is a well known fact that compromised legitimate websites are often used by cyber crooks to drive traffic towards their scammy sites. The latest example of this practice …
Featured news
Resources
Don't miss
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!
- Crypto-stealing iOS, Android malware found on App Store, Google Play
- OpenNHP: Cryptography-driven zero trust protocol