Ransomware impersonating European police agencies
Ransomware has been around for quite some time and likely won’t disappear soon, as it usually does manage to make inexperienced users fork over to the criminals quite a …
Windows 8 will have picture password sign in
As much as security experts would like for it to be otherwise, experience has taught us that no matter how many times some people are lectured on the use of complex passwords, …
Latest spam campaigns delivering the Zbot Trojan
For a while now, fake messages and warnings from USPS, FedEx and DHL about supposedly undelivered packages have been hitting inboxes, and users have been getting wiser about …
Week in review: Multiple dimensions of corporate espionage, 2012 biggest security threats, and avoiding malware behind QR codes
Here’s an overview of some of last week’s most interesting news, podcasts and articles: Rise of unencrypted cards 71 percent of merchants were found to store …
Visa probes into potential card processor security breach
Credit card company Visa has announced that it has been informed of a potential data security breach at a European payment processor and that it has mounted an investigation …
How to avoid malware hiding behind QR codes
As the use of QR codes becomes increasingly widespread, users should be aware that they are also becoming an easy way for malware peddlers to spread their malicious wares. …
Biggest security threat for 2012? Privacy violations
Cyber-espionage, along with privacy violations and social networking attacks facilitated by the increased use of mobile and tablet devices, will be the source of increased …
How to spot fake Android apps
In the wake of the news that Google has again been removing Premium SMS fraudulent apps masquerading as popular games from its the official Android Market, TrendMicro’s …
The risks of online shopping
More people than ever are using their personally owned smartphones to send and receive e-mails, browse the Internet, shop online and visit social media sites – as well …
Key security threats in the coming year
The widespread adoption of mobile devices, proliferation of applications and growth of cloud computing are helping accelerate business innovation and social benefits. However, …
GlobalSign reports CA infrastructure wasn’t compromised
When the self-styled ComodoHacker – who also claimed responsibility for the DigiNotar hack – boasted that he had access to GlobalSign’s “entire …
Silent updating for Internet Explorer
Microsoft announced that in 2012 Internet Explorer will be updated “silently” to its newest possible version. This new silent update will eliminate the pop-up …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days