Please turn on your JavaScript for this page to function normally.
Fake hi5 invitation carries malware

TrendLabs warns about a malicious spam email campaign that supposedly comes from the popular social networking website and contains a message asking recipients to set up an …

Bank sued for not preventing online theft

Mirroring the lawsuit that a couple from California raised against the Bank of America, Comerica Bank is being sued by Experi-Metal Inc. (EMI), a manufacturing firm from …

Security consultant turned hacker sentenced to 13 years in prison

Max Ray Vision, a 37-year-old hacker from San Francisco, has earned himself a 13 year long prison sentence on account of stealing two million credit card numbers from banks, …

Fake AV with online support service

In the latest Symantec report on rogue AV software, covering a period of one year (July 2008-June 2009), there have been some 43 million installation attempts from over 250 …

BruCON 2010 call for papers

BruCON is a 2-day security and hacking conference held in Brussels (24 & 25 September 2010), full of interesting presentations, workshops and security challenges. Help …

Minimalist server monitoring

Anfibia Reactor is a web-based server monitoring solution that oversees the CPU, memory, battery, hard drives, makes sure network connections are working, checks databases, …

F-Secure protects Android users

F-Secure released Anti-theft for Mobile and Mobile Security, which includes the Browsing Protection feature, for smartphones on the Android platform. Today’s smartphones …

Rogue software details: Security Essentials 2010

Security Essentials 2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Week in review: Aurora malware, cyber war games and 0-day vulnerabilities for sale

Here’s an overview of some of last week’s most interesting news and articles: Biggest Chinese hacker training site taken down Black Hawk Safety Net, which offered …

Hackers steal $50,000, bank refuses to assume responsibility

Fan Bao and his wife Cathy Huang from Highland Park, California, were shocked when they were notified of two fraudulent money orders that were set to transfer money in the …

Lawful wiretap interfaces accessible to cyber criminals?

The lawful intercept architecture in Cisco Systems’ networking products has been examined and found wanting by Tom Cross, manager of IBM’s X-Force research team. …

Rogue software details: MalwarePro

MalwarePro is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Don't miss

Cybersecurity news