Please turn on your JavaScript for this page to function normally.
Iran claims to have been targeted by second worm

If a statement from Gholam-Reza Jalali – the head of Iran’s Passive Defense Organization – is to be believed, it seems that Iran’s computers have been …

Wardriving gang targeting small firms

A group of individuals who are believed to have been engaged in wardriving around Seattle and stealing personal and financial information from networks belonging to small area …

Carder pleads guilty to hacking and selling stolen card numbers

A carder and hacker that has been arrested in 2009 by the Secret Service for trying to sell 40 stolen card numbers to one of their undercover agents, has pleaded guilty to …

Michigan State Police denies downloading drivers’ phone data

A few days ago, the American Civil Liberties Union of Michigan made public their belief that the Michigan State Police might have been using portable devices that allowed them …

Why do governments have trouble retaining cyber warriors?

It is becoming painfully obvious that the U.S. government and the governments of European countries are having trouble recruiting enough capable “cyber warriors” …

Gold-themed spam fishing for personal information

It is almost a rule of thumb that everything that might interest a large number of people makes for a good lure for spammers and scammers. From news regarding natural …

A closer look at DropDMG

DropDMG (v3.0.6) is a piece of software that helps you create and work with Mac disk images – Apple’s preferred format for distributing Mac software and the only …

Software company Ashampoo breached, customer data stolen

The German computer software company Ashampoo has been targeted by attackers that managed to gain access to its customers database and possibly exfiltrated data such as names …

Interest in royal wedding abused by fake AV peddlers

As the day of the wedding of Prince William of England and his long-time girlfriend Kate Middleton quickly approaches, scammers have began to exploit the interest of Internet …

Your iPhone keeps an unencrypted record of your movements

If you are an owner of an iPhone or a 3G iPad, you’ll probably want to know that your location – along with a timestamp – is recorded by the device and …

Facebook announces two-factor authentication

Facebook will be rolling out the two-factor authentication option which, once turned on, will ask users to insert a code when they try to log into the social network from a …

U.S. federal lab linked to Stuxnet breached

A federally funded U.S. lab that is suspected to have been involved in finding the vulnerabilities in Siemens SCADA systems used by the Stuxnet worm has shut down the Internet …

Don't miss

Cybersecurity news