Please turn on your JavaScript for this page to function normally.
The longevity of computer worms

Viruses, Trojans, worms. They all enjoy a (sometimes brief, sometimes long) period within which the are at the peak of their game – so to speak – but that period …

YouTube used to showcase DDoS software

Legitimate businesses use all that the Internet offers to make their sales go up. And even though the use of social media tools can affect office productivity and be an entry …

Eminem death video leads to malware

The death of a world-famous celebrity is always top news, and it’s regularly exploited by cyber criminals to spread their malicious payloads. I would venture to guess …

iPad phishing scams still going strong

iPad’s instant popularity is – by now – the stuff of legends, and the possibility of receiving it as a reward for being a BETA tester, participating in a …

Carder forum hack reveals information that can be used to track down members

It’s every forum for itself in the cut-throat market of carder forums, and a security breach affecting one of them means more market share for the rest. It is, …

.org becomes first generic TLD protected by DNSSEC

Knowing full well that DNSSEC won’t be the silver bullet that will solve the massive problem that is cyber security, but will at least provide protection against …

Phishing requires more effort than you might think

When it comes to setting up phishing pages, there are some phishers that make the extra effort. Take those behind the fake Orkut login pages, for example. Symantec has been …

Social networking “Bill of Rights” released

A little over a month ago, the Electronic Frontier Foundation offered their suggestions about what a social networking “bill of rights” should contain. Last week …

Network Security Auditing

This book is part of the Cisco Press Networking Technology Series, and is aimed at teaching security and network professionals the assessment, prevention, detection, reaction …

Twilight app turns mobile phones into zombies

While not the first one who has thought of demonstrating the ability of using an application to create a botnet of Android-running mobile devices, researcher Jon …

How much is Facebook data worth?

Facebook has over 400 million active users. Can you even imagine how much freely given, highly accurate user data is stored on each of those accounts? The marketing industry …

Technical-support-by-phone scams

So, it turns out that your computer doesn’t even have to be infected for you to become a target for people who offer to disinfect it – and charge you, of course! …

Don't miss

Cybersecurity news