Please turn on your JavaScript for this page to function normally.
Cybercriminals targeting sporting events and music festivals

BitDefender identified a series of scams targeting music festival goers, sporting event fans and holidaymakers this summer. The top summer-themed spam messages for 2011 relate …

Forensic data capture and data extraction

Logicub announced the Talon Enhanced forensic data capture solution and the CellXtract data extraction solution for mobile devices. The Talon Enhanced provides fast data …

Citigroup admits breach, warns customers about phishing

Citigroup has finally made public the fact that it suffered a breach into its systems in May and that the names of some 200,000 customers, their account numbers and contact …

Plankton Android Trojan found in 10 apps on Android Market

Ten more applications have been pulled from the Google’s official Android Market following a notification that they contained a new kind of Android malware. The malware …

Admins of popular movie streaming portal arrested, site shut down

Kino.to, one of the most popular European movie streaming portals, has been shut down following coordinated raids executed by police officers in Germany, France, Spain and the …

French certification authority reveals its private key by mistake

Certigna, a major French certification authority whose certificates are trusted in all of today’s most popular browsers – IE, Firefox, Safari, Opera, and many …

Rustock still down, Microsoft pursues the botherders

Microsoft believes that the individuals behind the (still crippled) Rustock botnets are located in Russia, so it placed advertisements in the The Moscow News and the Delovoy …

Drupal Prepopulate Module vulnerabilities

Two vulnerabilities have been reported in the Prepopulate module for Drupal, which can be exploited by malicious users to conduct script insertion attacks and by malicious …

How search engine poisoning works

Imperva disclosed the intricate workings of a Search Engine Poisoning (SEP) campaign. The attack was extremely successful and continued to run for at least 15 months without …

Tips for embracing cloud computing

In today’s complex landscape of constant innovation and change, organizations should take advantage of emerging capabilities, skills and processes to address their …

Trends in the badware landscape

Badware is a defining challenge for individuals, businesses, and governments throughout the world. Cybercriminals have developed a mature badware economy in which individual …

Free tool protects against harmful links

Today website owners, bloggers and forum administrators are faced with many security concerns that can get in the way of what they really want to be doing – which is …

Don't miss

Cybersecurity news