Please turn on your JavaScript for this page to function normally.
Forged checks pass flawed examination process

The recent cases of two Texan women who had their personal information and checking account numbers stolen and used to validate bogus checks, have brought into the spotlight a …

Trojan disguised as a toolbar for Facebook

A Facebook toolbar is just what you need to make your sharing and connecting with friends easier, says in an email supposedly coming from “Facebook.com”: If you …

Fake Amazon “Deal of the Day” emails doing rounds

Fake Amazon newsletters have lately become regular visitors in inboxes around the world, says Trend Micro. With “Amazon.com Deal of the Day” in the subject line, …

A possible solution for banking Trojans?

ZeuS, Spy Eye, Mariposa – these are just some of the many information-stealing Trojans out there. ZeuS is, hands down, the most prominent. Its longevity is assured by …

European privacy concerns regarding U.S. policies

There are a lot of people in Europe who feel that governments and companies should not be able to collect information of individuals so they can use it in ways that violate …

Fake Twitter email continues to plague inboxes, leads to malware

Almost a week ago, Twitter began warning its users about fake Twitter Support emails. Since then, a couple of variants of the email have surfaced, with small differences in …

The Storm botnet strikes again

Once upon a time, the Storm botnet was responsible sending out 20 percent of all spam, but was eventually crippled by the rise of new malicious software removal tools. By the …

Securing the Borderless Network: Security for the Web 2.0 World

The future of the Web is mobile, virtualized, and collaborative. Among all the positive aspects and advantages that these changes will bring, there will also be some problems …

New malicious PDF

A new type of malicious PDF file has recently been spotted in the wild. This one contains an malicious object that was embedded into the file through the use of common the …

Poisoned search results: Our daily reality

The biggest threat to search engines are not their competitors, but poisoned search results. Since the moment when search engines have largely become the starting point for …

A closer look at EXE Password Protector

Eltima’s EXE Password Protector (v. 1.1.6.214) allows you to password-protect any Windows executable file (excluding only system-critical files which influence Windows …

Changes in new ZeuS variants

The ZeuS/Zbot Trojan variants have been around for a long time. It has come to the point where the name is no longer recognized only by security specialist, but by the general …

Don't miss

Cybersecurity news