Google Image Search results redirect to Browlock ransomware
Browlock is the most basic approach to ransomware there is: there is no actual malware that blocks the victims’ computer or encrypts its contents, there is only a Web …
Sophisticated Google Drive phishing campaign persists
Symantec researchers are once again warning about a sophisticated and persistent phishing campaign targeting Google users. The victims are hit with fake emails sporting a …
Google, Facebook combat tech support advertising scams
TrustInAds.org, a new organization founded by AOL, Facebook, Google and Twitter aimed at protecting people from malicious online advertisements, has issued a report that …
Fake mobile AV apps sold on Google Play and Windows Phone Store
Remember when the popular but totally useless security app named Virus Shield appeared for sale on Google Play and netted its creators over $40,000 before being removed from …
Phishing campaigns target diverse webmail users at once
Every now and then, phishers mount campaigns that simultaneously target users of different online services. This time the lures are different: access to a document that is …
“Your Photos Are being Used” phishing scam targeting Facebook users
Another day, another Facebook phishing scam. This one comes in the form of a warning sent by a friend: “OMG YOUR PHOTOS ARE BEING USED ON THIS SITE.” The victim, …
Office workers have little trust in digital world
The majority of UK office workers have trouble deciding who to trust in the digital world, however this isn’t surprising considering 14 percent have already been badly …
Rolling Stones, One Direction fans scammed with fake free ticket offers
Rolling Stones and One Direction fans are being actively targeted by unscrupulous scammers, who encourage them to share a bogus offer of a free ticket to one of the …
Google account passwords stolen in phishing attack
Hackers have been stealing Google account passwords in a new and better crafted phishing attack that is hard to catch with traditional heuristic detection, according to …
Malware peddlers prefer deceptive tactics to exploits
Cyber crooks are losing interested in exploits as an attack vector, and are concentrating on deceptive downloads and ransomware as a means of earning/stealing money. The trend …
Beware of Google+ “Fraudulent Verification Survey” phishing scam
Phishers are again after Google account login details – this time they are trying pass themselves off as the nonexistent “Google+ All Domain Mail Team” and …
Attackers rope DVRs in bitcoin-mining botnet in record time
How long does it take for one out of the box digital video recorder to be compromised with malware once the device has been connected to the Internet? The unfortunate answer …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd