Please turn on your JavaScript for this page to function normally.
Pushdo Trojan bypasses audio catpchas

Webroot researcher Andrew Brandt came across a variant of the Pushdo bot that makes it possible for the computer to bypass audio captchas used by Microsoft’s webmail …

Seattle is US riskiest online city

Symantec teamed up with independent research firm Sperling’s BestPlaces to find and expose the top 10 US cities most vulnerable to cybercrime. And here are the results …

Critical Firefox bug won’t be exploited at Pwn2Own

A critical Firefox vulnerability that could result in remote code execution was disclosed a month ago by Evgeny Legerov, the founder of Moscow-based Intevydis, renowned lately …

Fake AV “blocks” popular sites

In a bid to create even more panic among the unfortunate users who have been tricked into downloading this fake AV solution and make them pay for a “full version”, …

Rogue software details: Total Win 7 Security

Total Win 7 Security is a rogue security application. In order to remove it, find out what file entry to look for below. Known system changes: File c:\userprofile\Local …

Law firms are the new banks

Money. It all comes down to it. Banks and financial institutions used to be easy targets for cyber criminals, but with improved security in place, they are no longer primary …

“Bombshell” McGee leads to malware

Did anybody doubt that the recent revelation of Hollywood star Sandra Bullock’s marital troubles and alleged infidelity of her (also) famous husband would become one of …

Solving the data privacy puzzle

The absence of uniform global legislation, regulations or standards for data privacy is posing a major data privacy puzzle for organizations faced with protecting the …

Google releases web application security scanner

Google released Skipfish, a free fully automated, active web application security reconnaissance tool. It prepares an interactive sitemap for the targeted site by carrying out …

Week in review: Amateur-run botnets, Mac OS X ransomware and feds on social networks

Here’s an overview of some of last week’s most interesting news, articles, reviews and videos: The rise of amateur-run botnets It used to be that cyber criminals …

Beware of malicious freebies

Sooner or later, we are all temped into downloading free software from the Internet – be it an application or a game. Most of the time, the program is legitimate and …

11 Chrome flaws patched, browser ready to survive Pwn2Own contest?

In a bid to make Google Chrome more difficult to compromise during the Pwn2Own contest that will be held during the CanSecWest conference less than a week from today, Google …

Don't miss

Cybersecurity news