Please turn on your JavaScript for this page to function normally.
Obama administration reveals cybersecurity plan

The Obama administration has issued a new legislative proposal that contains a number of steps it thinks critical to improving cybersecurity for U.S. citizens, the …

PSN attackers allegedly used Amazon cloud for attack

Attackers (mis)used the Amazon cloud to mount their attack against Sony’s online services and systems, and they did it legally, says Bloomberg. According to an unnamed …

Banking Trojan gang busted by Finnish police

Seventeen people were arrested for having taken part in a criminal scheme that targeted users of Finnish Nordea Bank and resulted in fraudulent transactions in the total …

Security needs to be unified, simplified and proactive

IT security powerhouse Check Point is on a mission to make the management of security products unified and simplified, and nowhere has that message been more clear than at its …

Facebook apps found giving access to user accounts to third parties

A discovery that really should not surprise anyone has been made yesterday by Symantec – it turns out that due to to a flaw in the authentication schemes used before the …

Fake Patch Tuesday alert leads to Zeus infection

The term “Patch Tuesday” has become widely known and is so intimately tied to Microsoft that it is no wonder that malware peddlers are using it to add an aura of …

Fake AV spreading via Yahoo! Answers

From poisoned Google image search results to poisoned answers to legitimate questions on Q&A sites like Yahoo! Answers and public forums, malware peddlers are determined …

Google Chrome sandbox apparently cracked

French security firm VUPEN has announced that its researchers have managed manufacture an exploit able to bypass Google Chrome’s sandbox, ASLR and DEP. It is precisely …

Sony suffers third breach, PSN still down

Sony’s troubles seem to have no end as the company confirms a third breach of their network and fails to set a date for the restoration of services. This last breach …

“Time spent on Twitter” scam spreads virally

Facebook users are already accustomed to practically daily offers of rogue apps that will supposedly show them who views their profile or allow them to use a similar feature …

Files uploaded to file hosting services accessed by malicious individuals

File hosting services such as RapidShare, FileFactory, Easyshare and others have a number of flaws that make it possible for unauthorized people to access and download files …

Poisoned Google image searches becoming a problem

If you are a regular user of Google’s search engine you might have noticed that poisoned search results have practically become a common occurrence. Google has, of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools