Fake Virustotal serves malware

The reputation of VirusTotal, the well-known site that allows you to check if a suspicious file is malicious or not, is bound to be somewhat affected by the emergence of a …

Relentlessly annoying banking Trojan

The majority of banking trojans prefers to hide in the deepest recesses of your computer and silently steal your login credentials. But CA’s researchers recently came …

SQL injection attack show-and-tell

SQL injection has, for a long time now, found its way to the top places of the list of favorite attack vectors of cyber criminals. Its popularity is, without a doubt, due to …

Microsoft cripples the Waledac botnet

A few days ago, Microsoft has requested and was granted a temporary restraining order that resulted in the takedown of 273 Internet domains that are believed to belong to …

Pros and cons of biometric authentication

In theory, biometrics are a great way to authenticate a user: it’s impossible to lose your fingerprint (barring the most gruesome of developments), you can’t …

A closer look at Comodo Dragon 1.0.0.5

Comodo Dragon is a recently released free Internet browser constructed on the open source Chromium Project browser. The installation process is simple and fast. You will be …

SEO poisoning reaches a new level

To improve the chances of installing their malware on random computers, scareware peddlers have decided to set up more that 60 websites that contain hundreds of possible …

End users are the main targets of online attacks

A report about the state of the Web by Zscaler indicates that cyber criminals have transferred the focus of their attacks from web and email servers to end user systems. Their …