Automated data protection for private clouds
EMC announced their new Data Protection Advisor management software that automatically monitors, analyzes, provides alerts and reports on all aspects of the protection status …
Alleged spam kingpin under investigation
31-year old Russian Igor Gusev is being investigated by the Russian police because they believe him to be the central figure behind the well-known spamming affiliate program …
Cybercriminals aggressively recruiting money mules
Money mules have been aggressively recruited this year to help cyber criminals launder money, according to Fortinet. A recent example of this is the worldwide prosecutions of …
Facebook “Check to see who has deleted you” scam
“See who your friends really are! Check to see who has deleted you,” offers the latest Facebook scam: If you’re tempted to use this application that goes by …
ZeuS-SpyEye merger
Feeling the heat of the attention of international law enforcement and the recent takedowns of various botnets and the worldwide arrests of gang members using his malware, the …
Facebook phishing worm compromises thousands of accounts
A very effective phishing worm has been targeting Facebook users and has been compromising their accounts by luring them with the offer of seeing a video. The victim would …
Firefox 0-day compromises visitors of Nobel Peace Prize website
The official site of the Nobel Peace Prize has been compromised by using a malicious PHP Script, and has been found serving malware by taking advantage of a Firefox zero-day …
Boonana Trojan for Mac OS X spreads via social media
SecureMac has discovered a new Trojan horse in the wild that affects Mac OS X, including Snow Leopard (OS X 10.6). The Trojan horse, Trojan.osx.boonana.a, is spreading through …
Computer pranks that simulate Trojan infections are invading the Web
As Halloween approaches, applications, fake websites, spam and Trojans all put on a disguise to try to trick users. PandaLabs has been detecting attacks like these since …
Most Americans support an Internet kill switch
Sixty-one percent of Americans said the President should have the ability to shut down portions of the Internet in the event of a coordinated malicious cyber attack, according …
CloudAudit joins the Cloud Security Alliance
The Cloud Security Alliance (CSA) announced that CloudAudit has become an official project of the CSA, with the joint mission of promoting the use of best practices for …
iOS security loophole allows access to passcode-protected iPhone
A security hole in Apple iOS 4.1 allows anyone to bypass the passcode screen and access certain functions of the iPhone. To do that, you must hit the “Emergency …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility