Please turn on your JavaScript for this page to function normally.
Dissecting the Hack: The F0rb1dd3n Network (Revised Edition)

This book approaches the subject of hacking in an interesting way. Part fiction, part reference manual, its target audience are people who want to or should know more about …

The aftermath of the Bredolab botnet shutdown

The war against botnets will be long and hard – there is no doubt about it. For one thing, command and control centers can be replaced and the targeted botnet …

Fake AV pushers poison US election search results

The US midterm elections are taking place today, and scareware pushers aren’t sitting with their hands crossed – they have poisoned related search results: Search …

Spying app kicked out of Android Market

Secret SMS Replicator, a spying application that forwards contents of a user’s text messages to the phone of the person who installed it in the first place, has been …

RIAA’s sites downed by Anonymous DDoS attack

Anonymous continues its Operation Payback and has DDoSed two official websites belonging to the Recording Industry Association of America. Riaa.com and riaa.org have been …

Facebook discovers and “punishes” UID-selling developers

The recent discovery that some Facebook application were inadvertently forwarding users’ UIDs to advertising agencies and data collection companies has spurred the …

New DDoS Trojan used for downing dissident sites

A new DDoS Trojan connected with a slew of attacks against Vietnamese blogs has been discovered by SecureWorks. Dubbed Vecebot, the Trojan drops three files into the …

One in five card holders use birth date as PIN

Remembering passwords may seem the biggest problem you have when managing your e-mail or social network account, but that’s only because you don’t really believe …

Obama Administration gets a “B” for cybersecurity

The Electronic Privacy Information Center released its annual Privacy Report Card for the Obama Administration and – when compared to last year’s results – …

A peek into Google’s anti-malware operation

Google goes to great lengths to secure its users from threats lurking on the Web, because a half-hearted effort would soon drive them out of business. But, during his …

Microsoft contemplating SSL for Bing

HTTP session hijacking as a possibility and tools to execute it have been around for more than half a decade, but it took an easy-to-use Firefox add-on like Firesheep to point …

Telstra’s blunder leads to massive data leak

It is yet unknown if it was a human or computer error that made Australian telecommunications and company Telstra send out letters containing personal information (name, phone …

Don't miss

Cybersecurity news