cybercriminals
Real life examples on hackers bypassing CAPTCHA
Computer-assisted tools and crowd sourcing can easily bypass traditional anti-spam solutions, forcing CAPTCHAs to evolve to address these techniques, according to Imperva. A …
Fake Amazon email leads to exploit kit
Fake Amazon order confirmations are hitting inboxes and trying to trick recipients into following any of the links to a page serving the Blackhole exploit kit. The email looks …
Fake Craigslist notifications lead to exploit kit
Emails purportedly sent by Craigslist have been hitting users’ inboxes and trying to get them to follow the offered link to a website hosting the Blackhole exploit kit, …
Android spying app masquerades as Gmail
A new piece of Android malware that has recently been unearthed by NQ Mobile researchers is capable of logging text messages and phone calls, as well as record them, and send …
How fraudsters are disguising PCs to fool device fingerprinting
Cybercriminals know that financial and ecommerce providers often use fraud detection systems that monitor for anomalous transactions and behaviors. In order to bypass these …
EURO 2012 lottery scams targets users
The 2012 UEFA European Football Championship kicks off in Poland on Friday, and scammers are trying to trick football fans into thinking the organizers have selected them as …
Is Flame something that we should worry about?
Much has been said and written in the last few days since the initial discovery of the so-called Flame (SkyWiper) toolkit. Security researchers have split in two camps: those …
Tiny but deadly banking Trojan discovered
The discovery of a new banking Trojan by the researchers working for CSIS Security Group has proved that a piece of malware doesn’t have to be big and complex to get the …
FBI warns of joint threat by ransomware and banking Trojan
The combination of the Citadel banking Trojan and Reveton ransomware that Trusteer warned about at the beginning of May is apparently still targeting users. So much so, that …
When syncing sinks your browser
Google Chrome’s most recent version (v19) introduced a “tab sync” feature. When inspecting this feature from a security perspective we realized that a new …
Programmer pleads guilty to US govt software source code theft
A Chinese computer programmer that was charged with stealing the source code of software developed by the US Treasury Department pleaded guilty to the charge on Tuesday. The …
Romanian hackers arrested for hitting government websites
Twelve individuals have been arrested across Romania for having allegedly compromised and defaced 29 websites of Romanian public institutions, and having stolen and leaked …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)