Twitter tackles phishing problem
In a bid to obstruct the phishing onslaught that has lately been targeting its users, Twitter has announced that it will rout the submitted direct messages through a new URL …
Online banking rip-offs go up, card fraud goes down
Losses due to credit and debit card fraud have fallen for the first time in 3 years, says the UK Cards Association, only to be supplanted by a rising incidence of phishing …
9 million ZeuS attacks blocked in the last 6 months
Trend Micro has seen a recent rise in average of around 300 unique ZeuS samples per day, according to a recent threat report that examines the Eastern European criminal …
Human exploit attacks surpass the software flaw approach
Barracuda Labs released its annual report for 2009, in which they highlight the shifts in Internet user behavior and the resulting attacker trends. Twitter Throughout 2009, …
And the winner is – FakeAV!
Taking advantage of the Oscar fever, criminals have poisoned search results regarding the award ceremony. Entering “oscar winners live 2010” you get this: …
Eight vulnerabilities fixed, one IE 0-day warning for Patch Tuesday
After last month’s mammoth Patch Tuesday release, administrators will be glad to know that this month Microsoft delivers only 2 bulletins that fix 8 vulnerabilities …
UK threatens to retaliate over cyber attacks
Rapidly approaching the point when retaliation against countries suspected of launching cyber attacks and engaging in cyber espionage will be ordered, the UK …
Log review checklist for security incidents
Anton Chuvakin, the well-known security expert and consultant in the field of log management and PCI DSS compliance and author of many books, and Lenny Zeltser, leader of the …
Email security trends
Proofpoint announced findings from a survey of 122 RSA Conference 2010 attendees, conducted at its exposition booth, about email security trends. Key findings from the survey …
Remote access app for iPhone and iPod touch
TeamViewer released TeamViewer and TeamViewer Pro iPhone. Designed for iPhone or iPod touch, from versions 2.2.1 and newer, the applications access or control remote Windows …
Mariposa bot distributed by Vodafone’s infected phone
Following yesterday’s news about the Energizer DUO USB recharger that infects PCs with a Trojan, here is another piece of equipment whose software comes bundled with …
Setting up a mobile botnet is alarmingly easy to do
The relative easiness of setting up a mobile botnet of nearly 8,000 phones has been demonstrated by Derek Brown and Daniel Tijerina at this year’s edition of the RSA …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations