Please turn on your JavaScript for this page to function normally.
Author of cloud-based phishing kit harvests collected credentials from phishers using it

People who embark on a life of crime are usually attracted by the promise of little effort and big money, and the hacker whose phishing kit was discovered to be collecting …

Exploitability data from real-time feeds

Qualys announced that QualysGuard Vulnerability Management now includes correlated exploitability information from real-time feeds to provide customers with up-to-date …

ZeuS, Sality, Chymine and Vobfus jump on the LNK vulnerability bandwagon

Stuxnet was only the beginning. The successful exploitation of the (still unpatched) Windows LNK flaw has prompted other malware attackers to try to achieve the same results. …

Facebook launches Safety page

Facebook recently passed the 500,000 user milestone, and the time has come to introduce a new addition to the already existing Facebook initiatives designed to keep users …

P2P increasingly favored by malware attackers

Cisco released its 2Q10 Global Threat Report, which is an aggregation of data and insights on threats from Cisco Security Intelligence Operations. The report merges the most …

PC surveillance software for Terminal Servers

Refog announces the release of Refog Terminal Monitor, a centralized software-based employee tracking system for the Terminal Server allowing administrators to track employee …

The impact of structural vulnerabilities on enterprise websites

Dasient released a new research report, “Structural Vulnerabilities on Websites: Why Enterprise Websites Are Vulnerable to Malware Attacks,” which found that, …

Fake ImageShack emails lead to Zbot variant

Emails pretending to be registration notifications from the popular free image hosting website ImageShack are hitting inboxes, and are trying to get the users to follow a link …

Free tool to protect against Windows “.LNK” zero-day flaw

Sophos has released the Sophos Windows Shortcut Exploit Protection Tool, which protects against a vulnerability that allows malicious hackers to exploit a bug in the way that …

Managing your identity, secure access and online storage while protected by the cloud

Webroot announced Webroot Internet Security Complete, the company’s newest consumer offering that integrates cloud-based threat protection with identity management and …

APWG launches offline phishing education program

The Anti-phishing Working Group has contributed its expertise in online fraud to the Internal Revenue Service with the creation of a new consumer fax education initiative to …

OMG! Profile Spy targeting Facebook users

Facebook users are a curious lot, and one of the things that seemingly regularly piques their interest is the opportunity to see who views their profile. Posts that read …

Don't miss

Cybersecurity news