Please turn on your JavaScript for this page to function normally.
Email marketing companies web accounts sending out malicious spam

The breach of the Atlanta-based Silverpop Systems back in December 2010 has resulted in the compromise of (some confirmed, some not) corporate mailing lists of over 100 big …

Over 300 cyberspy attacks against Russian targets discovered

Trend Micro researchers have discovered that 1465 computers belonging to 47 distinct political and economical entities in 61 different (mostly former Soviet Union) countries …

Is China behind the Japanese defense contractor hack?

Anonymous sources “in the know” regarding the investigation of the Mitsubishi Heavy Industries breach have hinted at the possibility that the attackers are …

Fake Diablo beta invites hitting inboxes

Since the third installment of the popular Diablo game franchise has been announced in 2008, fans all over the world have been impatiently waiting for it to become available. …

Fake stores dominant threat due to blackhat SEO

“Searches for buying software online remains 90 percent malicious, redirecting users to fake stores,” concluded Julian Sobrier recently, after having analyzed the …

48% of enterprises targeted by social engineering attacks

48% of enterprises have been victims of social engineering attacks, experiencing 25 or more such attacks in the past two years at a average cost of over £15,000 per …

XSS bug in Skype iPhone app allows address book theft

A bug in the latest version of Skype for iPhone and iPod touch makes its users vulnerable to having their address book stolen just by viewing a specially crafted message, says …

DigiNotar files for bankruptcy

After having its SSL and EVSSL certificates deemed untrustworthy by the most popular browsers, VASCO announced that DigiNotar, filed a voluntary bankruptcy petition and was …

Bots troll hacker forums to discover data breaches

When talking about bots, the first thing that comes to mind is often a bad one – i.e. how cyber crooks misuse the technology to bilk Internet users out of information or …

Cybercriminals find new ways to disguise spam

It used to be that malicious attachments came in emails with erotic photos of girls who “want to meet you”, or “scandalous photos” of celebrities. Now, …

Pay-per-install services attempt discreet comeback

“Pay-per-install businesses can be temporarily compromised by welcome law enforcement action, but the crooks will always find a way to return,” says McAfee’s …

Con artists love social networks

Most social networks’ users are hit by online scams almost daily – whether its the ubiquitous survey scam or the “share your cell phone number, get …

Don't miss

Cybersecurity news