And the winner is – FakeAV!

Taking advantage of the Oscar fever, criminals have poisoned search results regarding the award ceremony. Entering “oscar winners live 2010” you get this: …

UK threatens to retaliate over cyber attacks

Rapidly approaching the point when retaliation against countries suspected of launching cyber attacks and engaging in cyber espionage will be ordered, the UK …

Log review checklist for security incidents

Anton Chuvakin, the well-known security expert and consultant in the field of log management and PCI DSS compliance and author of many books, and Lenny Zeltser, leader of the …

Serious Apache vulnerability disclosed

A serious vulnerability in Apache’s HTTP web server that enables the attacker to gain remote access to the server and total control of a database, has been discovered by …

USB battery charger installs Trojan

The software that shows to which extent the battery is charged through the Energizer DUO USB recharger comes bundled up with a Trojan, says US CERT. The installer file for the …

Zuckerberg hacked into journalists’ email?

The renowned Facebook co-founder has been accused three years ago of stealing the source code and the business plan for the social network from some Harvard colleagues and for …

Fake drug peddlers hijack academic websites

Legal sites are often compromised and used as a stepping stone through which the user is taken to a malicious site. The latest of this kind of schemes has seen a string of …