Please turn on your JavaScript for this page to function normally.
Facebook rolls out new security features

If you have wondered why you have lately been asked to register the computer from which you access your Facebook account, wonder no more! Facebook has announced new tools and …

Latvian “Robin Hood” hacker’s identity revealed

The identity of the Latvian hacker who, earlier this year, hacked and publicly disclosed tax office data showing that state officials were still getting a enormous salaries in …

Attack detectors on CPUs expose backdoors

How can you be sure that the CPU on your computer hasn’t been tampered with and is not stealthily collecting your data for someone else to use? Adam Waksman and Simha …

Counterfeit consumer electronics

Most people believe that if you want to be sure that you got an original product, you must buy it from a reputable retailer – especially if that product is an electronic …

Laptop theft exposes data on 207,000 army reservists

Personal data on 207,000 U.S. army reservists has recently been stolen along with three laptops from the offices of a government contractor (Serco Inc.). The U.S. Army Reserve …

Facebook’s changes clash with Europeans’ expectations of privacy

Europeans are well-known for their high privacy expectations and demands. Another proof of that is a letter that the Article 29 Working Party (an independent European …

Unsolicited fake CVs distributing malware

The global recession has brought a shortage of jobs, but job seekers are not the only ones who are targeted by malicious emails and scams. TrendLabs has recently spotted an …

FacebookDigits phishing scam

Facebook users have lately been targeted lately by a clever phishing scam. The phishing website, whose looks evoke those of the social network, is trying to convince potential …

WordPress users under attack

WordPress-based websites have once again become the target of attacks. This time around, the hacked websites are hosted by various ISPs: DreamHost, GoDaddy, Media Temple and …

Filename-changing worm wiggling on P2P networks

Worms using P2P networks to propagate have one big problem: they are usually masquerading as software, key generators, or cracks, but have hard-coded file names, which means …

A closer look at LastPass

LastPass (v. 1.68.2) is a multi-platform, multi-browser password manager and form filler. You can use it on Windows, Mac OS or Linux; with IE, Firefox, Safari or Chrome. I …

The KHOBE attack: Are all AV solutions vulnerable?

Dubbed an “8.0 earthquake for Windows desktop security software” by its creators, the KHOBE (Kernel Hook Bypassing Engine) or the argument-switch attack has been …

Don't miss

Cybersecurity news