Please turn on your JavaScript for this page to function normally.
Dell
Well-informed tech support scammers target Dell users

Has Dell been breached and its databases containing customer’s personal, computer and tech support data been pilfered? Dell still won’t say yes or no, but many …

Cybercriminals increasingly hunting down the money

The tools used by cyber-criminals against businesses in 2015 were different to those used against consumers, according to Kaspersky Lab’s review of corporate threats in …

Darkode forum returns with lousy security that keeps serious users away

The newest version of the infamous Darkode cybercriminal forum is up, and it’s the worst one ever, says Loucif Kharouni, a senior threat researcher with Damballa.As you …

Cybercriminals to target new payment technologies

The year 2015 has become widely referred to as the year of the data breach. What nefarious cyber-acts will define 2016? Raytheon|Websense cybersecurity experts today shared …

Hacktivists and cyber extortionists hit Greek, Russian, UAE banks

A number of “regular” and central banks across Europe, Russia and Asia have been targeted by cyber attackers.Last week, in the wake of Turkey downing a Russian …

How malware peddlers trick users into enabling Office macros

A week ago, SANS ISC handler and freelance security consultant Xavier Mertens analyzed a Word document containing malicious macros, and unearthed in it a VBA function that …

Buhtrap gang distributes malware through Ammyy’s remote desktop software

ESET has uncovered several examples of malware being distributed via a strategic web compromise. Recently, visitors to ammyy.com were offered a bundle containing not only the …

Scammers use Google AdWords, fake Windows BSOD to steal money from users

Faced with the infamous Windows Blue Screen of Death (BSOD), many unexperienced computer users’ first reaction is panic. If that screen contains a toll free number …

Android ransomware masquerades as Adult Player app, takes photo of victim

“A new mobile ransomware variant uses a clever new technique to push affected users to pay the asked-for ransom: it takes a photo of the user with the phone’s …

Cybercriminals are becoming more creative

The second quarter of 2015 was wrought with high profile vulnerabilities and hacks. Cybercriminals became more inventive in their attack methods to infiltrate and abuse …

Cybercriminals are preying on existing vulnerabilities to plan future attacks

Solutionary performed a broad analysis of the threat landscape, which unearthed several key findings. They identified several campaigns targeting the bash vulnerability during …

The arsenal of SMS scammers, spammers and fraudsters

Illicit commercial activity online has manifested into all things mobile. With revenue in the billions from mobile marketing, criminals are doing their best to harness the …

Don't miss

Cybersecurity news