Please turn on your JavaScript for this page to function normally.
WikiLeaks site is down

Whether its really because the DDoS attacks against the WikiLeaks website have threatened “the stability of the EveryDNS.net infrastructure, which enables access to …

Adobe update scam offers “membership”

E-mails purportedly coming from the Adobe Support Team, reminding the recipient that a new version of Adobe Acrobat Reader has been released and offering a link …

WikiLeaks booted from Amazon, Assange to be arrested soon

While a “hacktivist” that goes by the handle of The Jester has claimed responsibility for the DDoS attack aimed at the WikiLeaks’ page via his Twitter …

ProFTPD.org main FTP server compromised

A warning has been issued by the developers of ProFTPD, the popular FTP server software, about a compromise of the main distribution server of the software project that …

Phishers exploit Facebook features

Phishing e-mails supposedly coming from the Facebook Security Team with account deactivation warnings have been hitting inboxes around the world. The targeted users are led to …

Chrome sandboxes Flash Player

It’s good news for Windows users – Chrome developers have added a Flash Player sandbox to the development channel of the browser, adding to the already present …

Exploit kit with integrated AV checker

The latest version of the relatively new “Siberia Exploits Kit” has an interesting feature that must make it pretty popular among criminals – a built in AV …

WikiLeaks and Assange under attack

While WikiLeaks’ site is still being bombarded with requests at a speed of 10 gigabits per second – making access to it very difficult and at moments even …

Amazon profiles abused by spammers and malware pushers

Experience has proven that if a site enables users to contribute content, this feature will be abused by those who want to push their own agenda – usually spammers. This …

Facebook’s recurring nuisance – the recycled scam

Every now and then, a new Facebook scam pops up that takes advantage of the users’ curiosity and lures them in by promising to allow them to view who has visited their …

Malicious Kodak Galleries used for serving Trojan

A variant of a highly specialized Trojan has appeared on fake sites mimicking Kodak Gallery pages, where potential victims are urged to download software that would supposedly …

Ransomware abounds

Ransomware is any malware that manages to make a computer system or any of the files on it inaccessible to the user and asks him or her to pay up if they want to regain …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools