Please turn on your JavaScript for this page to function normally.
Spear phishing campaign targeted e-mail marketers and their customers

For months now, a massive spear phishing campaign has been targeting employees of over 100 e-mail service providers, with the goal of compromising their computers and those of …

Scottish botnet master sentenced

Matthew Anderson – the Scottish botnet master who was found guilty of organizing a campaign that saw computers enslaved in a botnet, stealing data from their owners and …

Windows 0-day circumvents UAC

Windows zero-day vulnerabilities are lately getting discovered too often for Microsoft’s – and users’ – liking. Unfortunately for all of us, details of …

Kids lured to scam site by promises of parental control bypassing

The latest scam to hit Facebook users is one that supposedly offers a completely free proxy service for those who want to bypass parental controls and blocks set up by schools …

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ninja Hacking is not your typical "hacking" book. By comparing hackers with ninjas, the authors try to demonstrate how the ninja way of doing things can be translated to fit …

Two indicted for university hack binge

Two former students of the University of Central Missouri have been charged with computer intrusion, intercepting electronic communication and aggravated identity theft, …

Korean cross-border attacks exploited to spread malware

The recent cross-border shellings between North and South Korea have left many people wondering what has been going on and what triggered the attacks, and scareware and …

PacketWars: A cyber security sport for a cyber age

In this day and (cyber)age, hacking contests are sprouting like mushrooms after the rain – and it’s a good thing they do. For what better venue is there for …

Former Ford employee stole company secrets worth millions

An interesting case of theft of industrial trade secrets was unveiled yesterday as news that the culprit – one Xiang Dong (“Mike”) Yu – has pleaded …

Multiply users urged to download disguised malware

Users of the Multiply social networking site have lately been targeted with malicious personal messages coming from accounts opened by cybercriminals. The message implies that …

Exploit code for still unpatched 0-day used by Stuxnet released

After Stuxnet hit, it was discovered that it took advantage of four previously unknown Windows zero-day vulnerabilities to spread and compromise targeted systems. Three of …

Malaysian hacker breached Federal Reserve and DoD contractor networks

When agents arrested Malasyian Lin Mun Poo on account of selling US$1,000 worth of stolen credit card numbers just hours after he arrived in the U.S., they probably …

Don't miss

Cybersecurity news