Please turn on your JavaScript for this page to function normally.
How banks use Twitter to combat fraud

With phishing attacks hurting the credibility of email communications, forward thinking banks are turning to social media as the best channel to warn customers of scams and …

The evolution of traditional desktops into personal clouds

As users go virtual in all aspects of their life, the notion of doing all their work on a single traditional desktop in one physical location is rapidly evolving. …

Program defeats audio CAPTCHAs, researchers learn how to improve it

A group of researchers from Stanford University’s Security Laboratory has managed to build a computer program able to solve audio CAPTCHAs, reported the University on …

Comodo Brazil breached, sensitive data leaked

The recent spate of attacks against Sony’s various assets has probably made a lot of companies thank their lucky stars that they aren’t the ones who have been …

Apple acknowledges Mac Defender existence, gives removal instructions

It took a while for Apple to react properly to the onslaught of Mac Defender and similar fake AV aimed at Mac users, but they finally did it. Only days after the revelation of …

Sony online store hacked and user information published

It seems that hacking Sony’s assets has become a communal game in the hacker underground. Since the PSN hack, hardly a week went by without a hacker notifying the public …

Hotmail flaw allows attackers to exfiltrate emails

The analysis of a recent targeted attack against webmail users has led Trend Micro researchers to discover a vulnerability in Microsoft’s Hotmail webmail service that …

Fake VirusTotal site serves malware

VirusTotal – the popular free file checking website – has been spoofed by malware peddlers, warns Kaspersky Lab. A simple visit to the site triggers the download …

IBM WebSphere Portal XSS vulnerability

A vulnerability has been reported in IBM WebSphere Portal, which can be exploited by malicious people to conduct cross-site scripting attacks, according to Secunia. Certain …

Spammers establish their own fake URL-shortening services

For the first time ever, spammers are establishing their own their own fake URL-shortening services to perform URL redirection, according to Symantec. This new spamming …

LinkedIn security flaws allow account hijacking

LinkedIn users are in danger of having their their account hijacked when accessing it over insecure Wi-Fi networks or public computers, says independent security researcher …

US communications privacy law in for a change?

As technology speeds progressively forward, privacy laws need to get updated. As the amount of information we share and keep online – on social networks, stored in cloud …

Don't miss

Cybersecurity news