Please turn on your JavaScript for this page to function normally.
DDoS attackers on U.S. banks get help from hired botnets

It’s already common knowledge that major commercial bank in the U.S. are under a new series of DDoS attacks. As with the first one, the responsibility for this one that …

Japanese cops collar malware-carrying cat

When imagining law enforcement officers investigating and searching for cyber criminals or evidence about their activities, the last thing that you can probably envision is …

Romanian sentenced for multimillion-dollar payment card hack scheme

A Romanian national was sentenced today to serve 21 months in prison for his role in an international, multimillion-dollar scheme to remotely hack into and steal payment card …

New twists to previously-existing cyber scams

FBI’s Internet Crime Complaint Center (IC3) has released a report detailing recent cyber crime trends and new twists to previously-existing cyber scams. Among them is a …

Copied Android apps sold on Google Play at higher prices

App developer Root Uninstaller claims that some of his original apps for the Android platform have been copied and are currently being sold on Google Play. He offers the …

Conficker targets photography lovers

People who bought a Hama-manufactured slide scanner from popular German retailer chain Tchibo in the weeks leading to Christmas are being warned about taking home more than …

IE zero-day used in targeted watering hole attacks

News that an Internet Explorer zero-day vulnerability was being and has been for quite some time been used in a new “watering hole” attack has livened the …

Most unique viruses of 2012

PandaLabs outlined its picks for the most unique viruses of the past year. Rather than a ranking of the most widespread viruses, or those that have caused most infections, …

Phishing techniques, consequences and protection tips

In this interview, Rohyt Belani, CEO at PhishMe, illustrates the magnitude of the phishing threat. He discusses techniques, consequences and protection tips. What happens once …

Mobile malware, botnets and attacks on the cloud to rise

ESET has published its annual review of the past year’s threat trends and compiled predictions for 2013. According to the new report, the 2013 threatscape will see major …

“Change Facebook color theme” scam leads to spying Chrome extension

The end of one year and the beginning of another strikes a lot of people as the perfect moment to change something in their life and start with the proverbial clean slate. …

Vulnerabilities in Java and Adobe to become main targets for cybercriminals

Software vulnerabilities will be the main target of cyber-criminals next year, according to a list of security trends that will dominate in 2013 by PandaLabs. “It is …

Don't miss

Cybersecurity news