Please turn on your JavaScript for this page to function normally.
Facebook scammers impersonate missing persons org to harvest “likes”

Creating a Facebook page, making it popular and followed by many by using a number of approaches, then finally selling it to the highest bidder that’s interested in …

vBulletin.com hacked, hackers trying to sell info on 0-day used

The developers of popular Internet forum software vBulletin have announced late on Friday that their network has been attacked and successfully breached, and that the hackers …

Netflix users in danger of unknowingly picking up malware

Users of Silverlight, Microsoft’s answer to Adobe Flash, are in danger of having malware installed on their computers and being none the wiser, as an exploit for a …

Privileged threat analytics to detect in-progress attacks

CyberArk announced the availability of Privileged Threat Analytics, an analytics solution to detect malicious privileged account behavior and disrupt in-progress attacks …

Travelers are exposing their data on public networks

While aware of the risks, U.S. travelers are not taking the necessary steps to protect themselves on public Wi-Fi and are exposing their data and personal information to cyber …

Anonymous hacker sentenced to 10 years in prison

Jeremy Hammond (aka “Anarchaos”), the Anonymous hacker that earlier this year pleaded guilty to conspiracy and hacking charges regarding the much publicized breach …

A look into the MongoHQ breach

A recent security breach in MongoHQ (a MongoDB cloud services provider) left the company working hard to patch up security holes. Unfortunately common, this breach was only …

Only one in ten parents think their child is safe online

Most children’s internet use takes place away from the watchful eye of a parent and is still prone to cruel and abusive behaviors, according to McAfee and the …

IBM fuels new era of cognitive apps built in the cloud

IBM will make its IBM Watson technology available as a development platform in the cloud, to enable a worldwide community of software application providers to build a new …

Week in review: The operations of a cyber arms dealer, and top scams of the holiday season

Here’s an overview of some of last week’s most interesting news, articles and interviews: Snowden social-engineered co-workers to share their passwords New IE …

Malicious emails target multiple operating systems

Over the past several years, we have seen the proliferation of malware targeting mobile devices such as Android and iOS. The vast majority of the malware has been designed to …

NERC CIP compliance insufficient to ensure electric system security

Tripwire announced the results of a survey on North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) compliance. The online survey was …

Don't miss

Cybersecurity news