Please turn on your JavaScript for this page to function normally.
Alleged spam kingpin under investigation

31-year old Russian Igor Gusev is being investigated by the Russian police because they believe him to be the central figure behind the well-known spamming affiliate program …

Facebook “Check to see who has deleted you” scam

“See who your friends really are! Check to see who has deleted you,” offers the latest Facebook scam: If you’re tempted to use this application that goes by …

ZeuS-SpyEye merger

Feeling the heat of the attention of international law enforcement and the recent takedowns of various botnets and the worldwide arrests of gang members using his malware, the …

Facebook phishing worm compromises thousands of accounts

A very effective phishing worm has been targeting Facebook users and has been compromising their accounts by luring them with the offer of seeing a video. The victim would …

Firefox 0-day compromises visitors of Nobel Peace Prize website

The official site of the Nobel Peace Prize has been compromised by using a malicious PHP Script, and has been found serving malware by taking advantage of a Firefox zero-day …

iOS security loophole allows access to passcode-protected iPhone

A security hole in Apple iOS 4.1 allows anyone to bypass the passcode screen and access certain functions of the iPhone. To do that, you must hit the “Emergency …

Bredolab botnet beheaded

Botnet takedowns have become a common occurrence this year, and the last one to be hit is Bredolab. Counting some 30 million bots and nearly 150 command and control centers, …

Iranian Cyber Army behind TechCrunch Europe hack?

Political hacking might give the perpetrators a sense of accomplishment and some personal satisfaction, but will rarely bring them money. Since they obviously already have the …

A closer look at Watchmac

Watchmac (v.1.6) is a handy piece of software that will tell you if someone has fiddled with your laptop while you were gone – moved it, removed its battery or unplugged …

Fabric weaves security into program code

Wouldn’t it be wonderful if we could build security into a program as it is written? This idea spurred a number of researchers from Cornell University to try and develop …

Twitter phish targets users with huge following

A link that will supposedly take users to a page where they can use a “mobile” version of Twitter has been popping up here and there in a number of chatrooms over …

Apple resolves FaceTime security flaw

A flaw in the beta version of Apple’s FaceTime for Mac which was presented on Wednesday, has apparently allowed potential hackers to gain access to and modify a …

Don't miss

Cybersecurity news