cybercriminals
Email marketing companies web accounts sending out malicious spam
The breach of the Atlanta-based Silverpop Systems back in December 2010 has resulted in the compromise of (some confirmed, some not) corporate mailing lists of over 100 big …
Over 300 cyberspy attacks against Russian targets discovered
Trend Micro researchers have discovered that 1465 computers belonging to 47 distinct political and economical entities in 61 different (mostly former Soviet Union) countries …
Is China behind the Japanese defense contractor hack?
Anonymous sources “in the know” regarding the investigation of the Mitsubishi Heavy Industries breach have hinted at the possibility that the attackers are …
Fake Diablo beta invites hitting inboxes
Since the third installment of the popular Diablo game franchise has been announced in 2008, fans all over the world have been impatiently waiting for it to become available. …
Fake stores dominant threat due to blackhat SEO
“Searches for buying software online remains 90 percent malicious, redirecting users to fake stores,” concluded Julian Sobrier recently, after having analyzed the …
48% of enterprises targeted by social engineering attacks
48% of enterprises have been victims of social engineering attacks, experiencing 25 or more such attacks in the past two years at a average cost of over £15,000 per …
XSS bug in Skype iPhone app allows address book theft
A bug in the latest version of Skype for iPhone and iPod touch makes its users vulnerable to having their address book stolen just by viewing a specially crafted message, says …
DigiNotar files for bankruptcy
After having its SSL and EVSSL certificates deemed untrustworthy by the most popular browsers, VASCO announced that DigiNotar, filed a voluntary bankruptcy petition and was …
Bots troll hacker forums to discover data breaches
When talking about bots, the first thing that comes to mind is often a bad one – i.e. how cyber crooks misuse the technology to bilk Internet users out of information or …
Cybercriminals find new ways to disguise spam
It used to be that malicious attachments came in emails with erotic photos of girls who “want to meet you”, or “scandalous photos” of celebrities. Now, …
Pay-per-install services attempt discreet comeback
“Pay-per-install businesses can be temporarily compromised by welcome law enforcement action, but the crooks will always find a way to return,” says McAfee’s …
Con artists love social networks
Most social networks’ users are hit by online scams almost daily – whether its the ubiquitous survey scam or the “share your cell phone number, get …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments