Please turn on your JavaScript for this page to function normally.
Commission wants to minimize U.S. IP theft economic impact

As the long awaited first meeting between China’s new president Xi Jinping and U.S. president Barack Obama draws near, the problem of cyber espionage and theft of …

Guantanamo cuts off Wi-Fi access due to OpGTMO

The U.S. military, under whose command is the Guantanamo Bay Naval Base and the infamous prison of the same name that currently houses over 150 prisoners, has decided to shut …

APT1 is back, attacks many of the initial U.S. corporate targets

The APT1 hacker group is back to its old tricks, targeting a big number of organizations and businesses and, among them, many of those that they have previously breached, …

US DOJ accuses journalist of espionage

Last week’s revelation that the U.S. DOJ has successfully subpoenaed two months’ worth of telephone toll records for phones of AP journalist has created quite an …

Aurora attackers were looking for Google’s surveillance database

When in early 2010 Google shared with the public that they had been breached in what became known as the Aurora attacks, they said that the attackers got their hands on some …

“NATO vacancies” phishing email also leads to malware

An interesting and very comprehensive phishing and malware-delivery campaign has been spotted by Webroot researchers. The attackers are posing as the chief of NATO’s …

U.S. Congress has questions about Google Glass and privacy

Members of the U.S. Congress’ Bi-Partisan Privacy Caucus have sent an open letter to Google CEO Larry Page, questioning the company’s privacy consideration when it …

Jailed hacker designs device to thwart ATM card skimming

A Romanian hacker that has been jailed for his involvement with a criminal gang that planted ATM skimmers and stole card information has designed a new device aimed at …

Cyber espionage campaign uses professionally-made malware

Trend Micro researchers have discovered a new, massive cyber espionage campaign that has been hitting as many as 71 victims each day, including government ministries, …

Form-grabbing rootkit sold on underground forums

There seemingly no end to the automated tools that aspiring cyber crooks can buy on underground forums. The latest of these discovered by Webroot’s Dancho Danchev is …

U.S. DOD decides iPhones and iPads can connect to its networks

The Defense Information Systems Agency (DISA) of the U.S. Department of Defense has approved the use of government-issued iOS 6 devices when connecting to its military …

“Get free followers” scam targets Instagram users

If a service is popular, you can be sure that scammers and spammers will find a way of targeting as many of its users as they can. Trend Micro fraud analyst Karla Agregado …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools