Please turn on your JavaScript for this page to function normally.
Cybercrime statistics show widespread phishing problem

The top five industries vulnerable to cybercrime include travel, education, financial services, government services and IT services, according to KnowBe4. Using the Inc.com …

Fake AV spreading via Yahoo! Answers

From poisoned Google image search results to poisoned answers to legitimate questions on Q&A sites like Yahoo! Answers and public forums, malware peddlers are determined …

Facebook scammers go back to using Javascript

Facebook scammers know that in order to keep users falling for their scams, they have to use a variety of approaches. For example, there was a time where rogue applications …

Social media threats and targeted attacks

In the video below, Alexandru Catalin Cosoi, the Head of Online Threats Lab at BitDefender, talks about the new breed of social media threats and sophisticated targeted …

HBGary e-mails are a treasure trove for social engineers

The recent publication of the second batch of corporate e-mails exchanged between HBGary and HBGary Federal executives and various contacts in US intelligence, military and …

Inclement weather resurrects the “friend in need” scam

This recent spat of snowy weather has grounded may planes and stranded many passengers in Europe. It has also prompted scammers to resurrect en masse the tried and true friend …

Week in review: Gawker breach, social engineering and security predictions for 2011

Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Gawker Media breach claimed by Gnosis The credit for the breach of …

FarmVille players lured with fake “farm cash” offer from Zynga

The latest Facebook scam takes advantage of the popularity of Zynga’s FarmVille game and lures users into allowing an application access to their accounts with promises …

Hacktivism and social engineering emerge as top threats

Hacktivism and more profit-oriented malware, social engineering and malicious codes with the ability to adapt to avoid detection will be the main threats in the coming year, …

Underground toolkits will make cyber espionage easy

With the growing diversity of operating systems among companies, as well as the growing use of mobile devices, cybercriminals should have a very profitable 2011. Their tactic …

Don't miss

Cybersecurity news