Please turn on your JavaScript for this page to function normally.
The rise of Java exploits

Sifting through the data collected and analyzed in order to compile the latest Microsoft Security Intelligence Report, senior program manager Holly Stewart came to an …

Kaspersky download site hacked, redirecting users to fake AV

Kaspersky’s USA download site was hacked. For three and a half hours on Sunday, it has been providing download links that redirected users to a malicious web page where …

Assange runs into more problems in Sweden

Julian Assange has been denied a Swedish residence and work permit. As one of the founders and the editor-in-chief of whistleblower site Wikileaks, Assange applied for the …

Bogus Adobe employees sell fake PDF program

A series of e-mails purportedly sent by Adobe Acrobat Reader Support employees in which the users are urged to activate their “new Adobe PDF Reader” have been …

Phishing tax refund sites pop up in wake of deadline extension

Phishers taking advantage of the extended deadline for Indian taxpayers to file their income tax have cleverly thought of a way to trick customers of various banks with the …

Facebook apps send user information to ad agencies

Some five months ago, news broke that social networks were sending users’ ID numbers and/or names to advertising agencies every time the users click on the ads, by way …

Seven Deadliest Microsoft Attacks

Part of Syngress' "The Seven Deadliest Attack Series", this book introduces the reader to the anatomy of attacks aimed at Microsoft's networks and software: Windows, SQL and …

Fake Twitter homepages serving malware

A number of bogus Twitter main pages have been popping up and are offering misdirected users a chance to see naked ladies and to download malicious applications, Sunbelt …

ZeuS gang using malicious LinkedIn spam targets Charles Schwab accounts

The recently started LinkedIn spamming campaign that delivers the ZeuS Trojan – or, according to some, the Bugat Trojan – has been tied to a gang that uses the …

Government agents following suspects on social networks

The issue of whether or not government or law enforcement agents are or should be allowed to go “undercover” on social networks is not a new one, but thanks to the …

ZeuS developers up the ante with beefed up variant

ZeuS has for a while now been almost a synonym for banking Trojans of every shape and form. Some say that the attention that the information security community has focused on …

Android SMS Trojan variant targets Russian users

It worked for the first two times, why wouldn’t it a for third? It’s likely that the same scammers who were behind the previously discovered Android Trojan …

Don't miss

Cybersecurity news