Fake hi5 invitation carries malware
TrendLabs warns about a malicious spam email campaign that supposedly comes from the popular social networking website and contains a message asking recipients to set up an …
Bank sued for not preventing online theft
Mirroring the lawsuit that a couple from California raised against the Bank of America, Comerica Bank is being sued by Experi-Metal Inc. (EMI), a manufacturing firm from …
Security consultant turned hacker sentenced to 13 years in prison
Max Ray Vision, a 37-year-old hacker from San Francisco, has earned himself a 13 year long prison sentence on account of stealing two million credit card numbers from banks, …
Fake AV with online support service
In the latest Symantec report on rogue AV software, covering a period of one year (July 2008-June 2009), there have been some 43 million installation attempts from over 250 …
BruCON 2010 call for papers
BruCON is a 2-day security and hacking conference held in Brussels (24 & 25 September 2010), full of interesting presentations, workshops and security challenges. Help …
Minimalist server monitoring
Anfibia Reactor is a web-based server monitoring solution that oversees the CPU, memory, battery, hard drives, makes sure network connections are working, checks databases, …
F-Secure protects Android users
F-Secure released Anti-theft for Mobile and Mobile Security, which includes the Browsing Protection feature, for smartphones on the Android platform. Today’s smartphones …
Rogue software details: Security Essentials 2010
Security Essentials 2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Week in review: Aurora malware, cyber war games and 0-day vulnerabilities for sale
Here’s an overview of some of last week’s most interesting news and articles: Biggest Chinese hacker training site taken down Black Hawk Safety Net, which offered …
Hackers steal $50,000, bank refuses to assume responsibility
Fan Bao and his wife Cathy Huang from Highland Park, California, were shocked when they were notified of two fraudulent money orders that were set to transfer money in the …
Lawful wiretap interfaces accessible to cyber criminals?
The lawful intercept architecture in Cisco Systems’ networking products has been examined and found wanting by Tom Cross, manager of IBM’s X-Force research team. …
Rogue software details: MalwarePro
MalwarePro is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations