Please turn on your JavaScript for this page to function normally.
4 million identity fraud victims in the UK

Identity fraud continues to rise with 4 million victims in UK alone – yet consumers continue to be complacent with their identities. According to research commissioned …

How the German “Federal Trojan” was actually used

After the Chaos Computer Club hackers made public the results of their analysis of a few samples of the so-called “Federal Trojan” and found it capable of more …

When it comes to intrusions, size matters

A survey of enterprise IT managers and network administrators that has been conducted annually since 2005 shows that there has been a gradual increase in smaller enterprises …

WineHQ database breached; Fedora Project forces password change

Following last month’s compromises of the primary repository for the Linux kernel source code and the websites and infrastructure of the Linux Foundation comes the news …

Trojanized Netflix app steals account login credentials

When Netflix released an Android client app earlier this year, it also witnessed the attempts of various app developers who tried to make a pirated copy of it work on other …

Two state-sponsored groups responsible for RSA breach

Two distinct groups were behind the March attack against RSA’s networks, said RSA president Tom Heiser, and they seem to have been directed in their efforts by a single …

Verizon Business data breach investigations report 2011: 8 days a week

What can be learned from the investigation into successful data breaches? What are the latest trends and techniques used by attackers? Get a front row seat at the breach cases …

Best practices for fighting credit card theft

3Delta Systems issued a set of business best practices for protecting customer credit card account information and minimizing corporate exposure to online payment scams. …

HTC Android devices allow almost any app access to private data

It’s bad news all around for users of various HTC Android smartphones, as the private data collected by the logging tools recently introduced by the company is also …

Nearly 5 million military health care files stolen

Sensitive data about nearly 5 million patients has been compromised following the theft of backup tapes from an electronic healthcare app used in the military health system, …

25% of tested Google Chrome extensions allow data theft

27 of a 100 tested Google Chrome extensions have been found vulnerable to data (passwords, history, etc.) extraction attacks though specially crafted malicious websites or by …

Alureon extracts backup C&C locations embedded in images

An Alureon Trojan variant designed to extract the location of backup C&C centers from images disseminated across the Web has been discovered by a Microsoft researcher. …

Don't miss

Cybersecurity news