Please turn on your JavaScript for this page to function normally.
Sony online store hacked and user information published

It seems that hacking Sony’s assets has become a communal game in the hacker underground. Since the PSN hack, hardly a week went by without a hacker notifying the public …

Hotmail flaw allows attackers to exfiltrate emails

The analysis of a recent targeted attack against webmail users has led Trend Micro researchers to discover a vulnerability in Microsoft’s Hotmail webmail service that …

Fake VirusTotal site serves malware

VirusTotal – the popular free file checking website – has been spoofed by malware peddlers, warns Kaspersky Lab. A simple visit to the site triggers the download …

IBM WebSphere Portal XSS vulnerability

A vulnerability has been reported in IBM WebSphere Portal, which can be exploited by malicious people to conduct cross-site scripting attacks, according to Secunia. Certain …

Spammers establish their own fake URL-shortening services

For the first time ever, spammers are establishing their own their own fake URL-shortening services to perform URL redirection, according to Symantec. This new spamming …

LinkedIn security flaws allow account hijacking

LinkedIn users are in danger of having their their account hijacked when accessing it over insecure Wi-Fi networks or public computers, says independent security researcher …

US communications privacy law in for a change?

As technology speeds progressively forward, privacy laws need to get updated. As the amount of information we share and keep online – on social networks, stored in cloud …

Cybercrime statistics show widespread phishing problem

The top five industries vulnerable to cybercrime include travel, education, financial services, government services and IT services, according to KnowBe4. Using the Inc.com …

The rise of layered fraud prevention

By 2014, 15 percent of enterprises will adopt layered fraud prevention techniques for their internal systems to compensate for weaknesses inherent in using only authentication …

Mobile users: Risky behavior and weak security

Researchers found that while an increasing number of consumers use mobile devices for both business and personal activities, large numbers are not familiar with their …

iPhone hardware encryption investigated

Users of Apple iPhone devices accumulate huge amounts of highly sensitive information stored in their smartphones. Historical geolocation data, viewed Google maps and routes, …

iPhone 5 spam run leads to malware

The date of the release of iPhone 5 is still unknown, but that doesn’t stop malware peddlers from using it to lure in Apple fanatics. After all, didn’t a recent …

Don't miss

Cybersecurity news