Please turn on your JavaScript for this page to function normally.
Fake Amazon Kindle receipt leads to persistent malware

Amazon customers buying e-books for their Kindle or other mobile devices should be careful with emails that seemingly containing receipts for their purchases, warns Webroot, …

Digital certificates and malware: a dangerous mix

In the past few days we have heard several stories about major corporations getting hacked and their security systems completely bypassed. If anything, that should remind us …

Business is booming for exploits, mobile malware

Business is thriving for exploits, mobile malware is still dominated by Android and Symbian, and botnets are back and retooled, according to a new threat report from F-Secure …

Cisco unveils open networking “fabric” for data centers, clouds

Network speed, latency, and greater network port density in a single unit are key considerations for customers deploying virtualized data centers and moving to a managed cloud …

Hackers breach U.S. Energy Department networks

Notifications sent out to employees and contractors of the U.S. Department of Energy have confirmed that it and its networks have been the latest victim of …

FTC urges mobile platforms to consider offering Do Not Track

The explosive growth of mobile services allows consumers to do things that would have been hard to imagine only a few years ago, but at the same time, mobile technology raises …

Dutch hacker imprisoned for trafficking 100,000 credit cards

A Dutch citizen who was arrested and extradited from Romania was sentenced to 12 years in prison for a computer hacking and credit card fraud scheme that victimized people …

The rise of mobile advertising malware toolkits

In Q4 2012, FortiGuard Labs has highlighted malware samples that show four typical methods cybercriminals are using today to extract money from their victims. In addition, the …

Citadel Trojan used in unusual targeted attacks

The Zeus/Zbot banking malware and its variants and derivates (such as the Citadel Trojan) have, until now, been used for stealing banking credentials from random users. But …

The privacy implications of Facebook Graph Search

With a billion people sharing an assortment of personal information on a daily basis, Facebook holds the most significant amount of private information in today’s …

Oracle rushes out emergency Java patch

If you’re still among the users who haven’t disabled Java in their browsers or on their computer, be advised that Oracle has released a critical patch update for …

Sophos updates mobile device management for Android

Sophos announced Sophos Mobile Control 3.0, which is offered both on-premise and as-a-service. It includes support for Samsung SAFE devices, granting control over how devices …

Don't miss

Cybersecurity news