Please turn on your JavaScript for this page to function normally.
Real life examples on hackers bypassing CAPTCHA

Computer-assisted tools and crowd sourcing can easily bypass traditional anti-spam solutions, forcing CAPTCHAs to evolve to address these techniques, according to Imperva. A …

Fake Amazon email leads to exploit kit

Fake Amazon order confirmations are hitting inboxes and trying to trick recipients into following any of the links to a page serving the Blackhole exploit kit. The email looks …

Fake Craigslist notifications lead to exploit kit

Emails purportedly sent by Craigslist have been hitting users’ inboxes and trying to get them to follow the offered link to a website hosting the Blackhole exploit kit, …

Android spying app masquerades as Gmail

A new piece of Android malware that has recently been unearthed by NQ Mobile researchers is capable of logging text messages and phone calls, as well as record them, and send …

How fraudsters are disguising PCs to fool device fingerprinting

Cybercriminals know that financial and ecommerce providers often use fraud detection systems that monitor for anomalous transactions and behaviors. In order to bypass these …

EURO 2012 lottery scams targets users

The 2012 UEFA European Football Championship kicks off in Poland on Friday, and scammers are trying to trick football fans into thinking the organizers have selected them as …

Is Flame something that we should worry about?

Much has been said and written in the last few days since the initial discovery of the so-called Flame (SkyWiper) toolkit. Security researchers have split in two camps: those …

Tiny but deadly banking Trojan discovered

The discovery of a new banking Trojan by the researchers working for CSIS Security Group has proved that a piece of malware doesn’t have to be big and complex to get the …

FBI warns of joint threat by ransomware and banking Trojan

The combination of the Citadel banking Trojan and Reveton ransomware that Trusteer warned about at the beginning of May is apparently still targeting users. So much so, that …

When syncing sinks your browser

Google Chrome’s most recent version (v19) introduced a “tab sync” feature. When inspecting this feature from a security perspective we realized that a new …

Programmer pleads guilty to US govt software source code theft

A Chinese computer programmer that was charged with stealing the source code of software developed by the US Treasury Department pleaded guilty to the charge on Tuesday. The …

Romanian hackers arrested for hitting government websites

Twelve individuals have been arrested across Romania for having allegedly compromised and defaced 29 websites of Romanian public institutions, and having stolen and leaked …

Don't miss

Cybersecurity news