A standardized format for cybercrime reporting
“Cybercrime is emerging as a very concrete threat. Considering the anonymity of cyberspace, it may in fact be one of the most dangerous criminal threats ever,” …
Phishers still favor spam over social networking sites
SpamTitan Technologies announced the findings of its latest survey of SMBs on the continued danger of phishing attacks, and it shows that despite media reports about the rise …
Trojan posing as installer wants your money
A Trojan masquerading as an installer for well-known applications such as DivX, μTorrent, LimeWire, Avast! Antivirus and others has been popping up on users’ …
XSS Twitter flaw used to expose users to potentially malicious sites
Earlier this morning, Sophos begin to warn people about a new Twitter XSS flaw that is being used by malicious individuals to redirect users to third-party websites without …
Win free tickets for GRC 2010 in Lisbon
At the end of October, an event named GRC 2010 is to be held in Lisbon, Portugal, and it proposes to bring to its participants the main challenges that managers involved in …
One in five students have hacked, one in three did it for fun
Research published today by Tufin Technologies reveals that 23% of college and university students have hacked into IT systems. Of these hackers, 40% waited until after their …
Adobe releases security update for Flash Player
New versions of Adobe Flash Player have been released today in order to patch a critical vulnerability in earlier versions of the program for Windows, Macintosh, Linux, …
Fake “universal” iPhone jailbreaking exploit contains Trojan
When Apple released iOS 4.0.2 which, among other things, patched the vulnerabilities that allowed iPhone owners to jailbreak their device, these users were faced with the …
4chan users take MPAA, RIAA websites down with DDoS attacks
The websites of the Motion Picture Association of America (MPAA) and Indian tech firm Aiplex Software were crashed by DDoS attacks yesterday. The architects and executors of …
Google rolls out 2-factor authentication for Gmail and Apps
In view of the ever increasing number of successful phishing attacks that leave users with compromised accounts, Google has announced the introduction of two-step verification …
Mobile fraud detection imperative for the future of mobile commerce
By year-end 2013, location information or profile information from mobile phones will be used to validate 90 percent of mobile transactions, and the rapid adoption of …
Cybercriminals steal Interpol Chief’s identity to access info on fugitives
Ronald Noble, Interpol’s Secretary General, has revealed that cybercriminals have opened two fake Facebook accounts using his name and used them to gather sensitive …
Featured news
Sponsored
Don't miss
- Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)
- Chinese hackers compromised an ISP to deliver malicious software updates
- The role of AI in cybersecurity operations
- How to start your cybersecurity career: Expert tips and guidance
- MISP: Open-source threat intelligence and sharing platform