SEO poisoning reaches a new level
To improve the chances of installing their malware on random computers, scareware peddlers have decided to set up more that 60 websites that contain hundreds of possible …
Attackers focusing on capturing personal data
Online criminals are garnering greater success with increased technical sophistication affecting a wider range of industries. With greater diversity and the use of targeted …
Hackers follow the money, IBM research shows
Existing threats such as phishing and document format vulnerabilities have continued to expand, even as users improve security, according to a new IBM report. The X-Force …
Protect Mac applications against piracy and malicious attacks
As the Mac platform continues to gain popularity, attackers are increasingly exploiting weaknesses in Mac OS X applications to invade end-user systems. This exploitation leads …
Worm spreads on Fotolog social networking website
PandaLabs has reported the appearance of a new worm, FTLog.A, which spreads through the popular Fotolog social networking site. This foto-blogging portal is used by almost 30 …
End users are the main targets of online attacks
A report about the state of the Web by Zscaler indicates that cyber criminals have transferred the focus of their attacks from web and email servers to end user systems. Their …
Beware of the fake FBI fingerprint scanner
According to information popping up in some online forums, an application that supposedly allows you to enter and search the FBI fingerprint database will be released in a few …
Is 2010 the year of the cloud?
Research by Resource on Demand claims to show the company has been receiving a record number of enquiries for salesforce and SaaS specialists during the first month of the …
Phishing spam from “Bank of Nevada”
What seemed like a typical phishing email was received by TrendLabs for analysis, but turned out to be just a ploy to get users to visit a malicious site with adult content. …
Video: This you???? Twitter phishing attack demonstrated
A phishing attack on Twitter asks “This you????” and links to a bogus login page. Here’s a video from Sophos that shows how it works:
Rogue software details: TrustFighter
TrustFighter is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
US unable to win a cyber war
The inability to deflect even a simulated cyber attack or mitigate its effects shown in the exercise that took place some six days ago at Washington’s Mandarin Oriental …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations