How does cell phone money laundering work?
In Russia, most cell phone SIM cards are prepaid. One of the major Russian operators offers a legal service that allows anyone to transfer the prepaid amount of money from a …
New techniques for detecting hardware Trojans
Most Internet users know about the existence of software Trojans, but that of hardware ones is less known. They consist of integrated circuits that have been modified by …
Cybercriminals exploiting user inexperience
Noteworthy threats in October 2011 included the return of a rogue web browser, a phony hacking tool for Gmail account password recovery and malware disguised as advertisements …
Norman releases endpoint protection system
Norman released Endpoint Protection 9, which stops all kinds of malware threats including viruses, worms, trojans, spyware, adware, bots, zero-day threats and rootkits. …
FBI arrests six for DNS hijacking scam worth $14 million
Charges against six Estonian nationals and one Russian national for engaging in a massive and sophisticated Internet fraud scheme that infected with malware more than four …
Oracle Solaris 11: The first cloud OS
Oracle today released Solaris 11, the first Cloud OS. Oracle Solaris 11 is designed to meet the security, performance and scalability requirements of cloud-based deployments …
Bitdefender prevents scams on Twitter
Bitdefender is adding a tool to its arsenal to prevent scams on Twitter. Safego has emerged successful from beta testing by Twitter users and will be incorporated into …
New fuzzing platform from Codenomicon
Codenomicon released Defensics X, the latest version of their security and robustness testing software. The update introduces better coverage through infinite test case …
The 12 scams of Christmas
‘Tis the season for consumers to spend more time online – shopping for gifts, looking for great holiday deals on new digital gadgets, e-planning family …
Worldwide security service spending to reach $35.1 billion
Worldwide security services spending is on pace to reach $35.1 billion in 2011, up from $31.1 billion in 2010, according to Gartner. The market is forecast to total $38.3 …
DARPA invites white hats to help with U.S. cyber defense
The Defense Advanced Research Projects Agency (DARPA) is asking the government to ramp up its cyber research funding from $120 million to $208 million for 2012, and in the …
Global phishing trends and domain name use
A new survey by the Anti-Phishing Working Group (APWG) reveals that phishing attacks perpetrated against Chinese e-commerce and banking sites soared by 44 percent in the first …
Featured news
Resources
Don't miss
- Public mobile networks are being weaponized for combat drone operations
- Attackers keep finding the same gaps in security programs
- China-linked hackers exploited Dell zero-day since 2024 (CVE-2026-22769)
- The era of the Digital Parasite: Why stealth has replaced ransomware
- Scammers exploit trust in Atlassian Jira to target organizations