Please turn on your JavaScript for this page to function normally.
Government agents following suspects on social networks

The issue of whether or not government or law enforcement agents are or should be allowed to go “undercover” on social networks is not a new one, but thanks to the …

ZeuS developers up the ante with beefed up variant

ZeuS has for a while now been almost a synonym for banking Trojans of every shape and form. Some say that the attention that the information security community has focused on …

Android SMS Trojan variant targets Russian users

It worked for the first two times, why wouldn’t it a for third? It’s likely that the same scammers who were behind the previously discovered Android Trojan …

Microsoft’s Network compromised, used to route traffic to spam websites

Microsoft has confirmed that two network devices on its network have indeed been compromised and were being used by criminals to route traffic to more than a thousand websites …

A closer look at SafeCopy Backup

SafeCopy Backup is an online backup service that allows you to backup files from an unlimited number of Windows and Mac computers and mobile devices, to access them from …

Amazon Seller Central vulnerable to XSS

To demonstrate that the Amazon Seller Central password reset page is vulnerable to an XSS attack, a regular submitter to the XSSed.com website has injected an iFrame tag that …

FakeAV peddlers targeting computer professionals

Malware peddlers have a general preference for compromising legitimate sites in order to distribute their malicious wares. Sometimes it is easier to compromise an already …

Facebook introduces one-time passwords

For all those who simply must access Facebook from a public computer, the social network introduced the option of receiving a one-time password to be used instead of their …

Long-awaited jailbreaking tool released

Greenpois0n, the jailbreaking tool whose release was eagerly awaited by the jaibreaking community, and the wait for which was even misused by malware peddlers, was finally …

A foolproof drive-by-download blocking tool?

A seemingly foolproof tool for blocking drive-by-download attacks has been developed by a group of researchers at the Georgia Institute of Technology and California-based SRI …

CISSP Study Guide

The title of the book is self-explanatory - this is a study guide for all of you out there who aspire to become a Certified Information Systems Security Professional. …

Google’s Gmail security checklist

Every now and then, Google adds tools and issues warnings that are meant to help its users feel and stay safe while using their offerings – the recent warning to Gmail …

Don't miss

Cybersecurity news