Please turn on your JavaScript for this page to function normally.
Google Image Search results redirect to Browlock ransomware

Browlock is the most basic approach to ransomware there is: there is no actual malware that blocks the victims’ computer or encrypts its contents, there is only a Web …

Sophisticated Google Drive phishing campaign persists

Symantec researchers are once again warning about a sophisticated and persistent phishing campaign targeting Google users. The victims are hit with fake emails sporting a …

Google, Facebook combat tech support advertising scams

TrustInAds.org, a new organization founded by AOL, Facebook, Google and Twitter aimed at protecting people from malicious online advertisements, has issued a report that …

Fake mobile AV apps sold on Google Play and Windows Phone Store

Remember when the popular but totally useless security app named Virus Shield appeared for sale on Google Play and netted its creators over $40,000 before being removed from …

Phishing campaigns target diverse webmail users at once

Every now and then, phishers mount campaigns that simultaneously target users of different online services. This time the lures are different: access to a document that is …

“Your Photos Are being Used” phishing scam targeting Facebook users

Another day, another Facebook phishing scam. This one comes in the form of a warning sent by a friend: “OMG YOUR PHOTOS ARE BEING USED ON THIS SITE.” The victim, …

Office workers have little trust in digital world

The majority of UK office workers have trouble deciding who to trust in the digital world, however this isn’t surprising considering 14 percent have already been badly …

Rolling Stones, One Direction fans scammed with fake free ticket offers

Rolling Stones and One Direction fans are being actively targeted by unscrupulous scammers, who encourage them to share a bogus offer of a free ticket to one of the …

Google account passwords stolen in phishing attack

Hackers have been stealing Google account passwords in a new and better crafted phishing attack that is hard to catch with traditional heuristic detection, according to …

Malware peddlers prefer deceptive tactics to exploits

Cyber crooks are losing interested in exploits as an attack vector, and are concentrating on deceptive downloads and ransomware as a means of earning/stealing money. The trend …

Beware of Google+ “Fraudulent Verification Survey” phishing scam

Phishers are again after Google account login details – this time they are trying pass themselves off as the nonexistent “Google+ All Domain Mail Team” and …

Attackers rope DVRs in bitcoin-mining botnet in record time

How long does it take for one out of the box digital video recorder to be compromised with malware once the device has been connected to the Internet? The unfortunate answer …

Don't miss

Cybersecurity news