Phishing made easier

Given the proliferation of phishing sites, you may be excused for thinking that phishing schemes are easy to set up. Unfortunately for the common Internet user, phishing has …

Spam disguised as spam notification

In their constant battle against anti-spam filters, spammers have recently started to camouflage their messages as spam quarantine notifications: Looks quite legitimate, …

Top 7 threats to cloud computing

The Cloud Security Alliance and HP have presented today new research findings that detail the potential threats linked to the use of cloud services. The report, titled …

A 184% increase of malicious websites

The volume of spam saw an increase of 5,5 percent, and malicious websites of a whooping 184 percent since January, says the latest MessageLabs Intelligence report. An increase …

Fake Virustotal serves malware

The reputation of VirusTotal, the well-known site that allows you to check if a suspicious file is malicious or not, is bound to be somewhat affected by the emergence of a …

Relentlessly annoying banking Trojan

The majority of banking trojans prefers to hide in the deepest recesses of your computer and silently steal your login credentials. But CA’s researchers recently came …

SQL injection attack show-and-tell

SQL injection has, for a long time now, found its way to the top places of the list of favorite attack vectors of cyber criminals. Its popularity is, without a doubt, due to …

Microsoft cripples the Waledac botnet

A few days ago, Microsoft has requested and was granted a temporary restraining order that resulted in the takedown of 273 Internet domains that are believed to belong to …

Pros and cons of biometric authentication

In theory, biometrics are a great way to authenticate a user: it’s impossible to lose your fingerprint (barring the most gruesome of developments), you can’t …