Please turn on your JavaScript for this page to function normally.
(IN)SECURE Magazine issue 29 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 29 has been released today. Table of contents …

Security concerns around “backdoor” mobile devices

Employee owned, “backdoor’ mobile devices entering the corporate network highlight ongoing security challenges with enterprise mobility, according to Mformation. …

Illegal online pharmacies target mobile users

Malware authors have begun to set their sights on mobile device users, as witnessed by the latest Trojans made for Android-running devices, on official and unofficial online …

Charlie Sheen is not dead, it’s a clickjacking scam

Charlie Sheen’s downward spiral is unfolding right under the public’s eye and has spurred many scammers to take advantage of the users’ interest in the …

10 scammers charged with running 419 scam

Ten people were arrested and are now facing charges of wire fraud in US federal court following a successful investigation that has them pegged as perpetrators of an advanced …

Malvertising attacks surge

Malvertising is on a significant rise, having doubled from Q3 to Q4 2010, according to Dasient. Based on Q4 estimates, three million malvertising impressions were served per …

Tough questions about botnets

ENISA published a comprehensive study on the botnet threat and how to address it. The report looks at the reliability of botnet size estimates and makes recommendations for …

“Facebook sponsored weight loss product” scam is back

The “Facebook sponsored weight loss product” scam makes a comeback on the social network and tries to lure its users with fake testimonial messages on their …

Google removes malicious Android apps with kill switch

After last week’s discovery of some 50+ malicious applications on the official Android Marketplace, Google has removed them as soon as they became aware of their …

Metasploit Pro 3.6 released

Metasploit brings an enhanced command-line feature set for increased proficiency and detailed PCI reports with pass/fail information for a view of compliance posture with PCI …

French government networks breached in search for G20 files

It seems that France is the latest country whose government computer networks have been targeted by malicious individuals with likely ties to the Chinese government. The …

Security framework integrates forensics and data auditing

AccessData announced the initial release of its new integrated security framework, CIRT (Cyber Intelligence and Response Technology), and is inviting select government and …

Don't miss

Cybersecurity news