Please turn on your JavaScript for this page to function normally.
Check how secure, private and open an app is

Surfing through the Net in search of a objective review of an application can be a daunting task, and even when you find one, it usually barely touches the issues of security …

iPad, iPhone “prizes” as lures for Twitter users

Not surprisingly, spam using the Apple iPad as a lure to get users to give up personal or credit card information has began to make rounds of Twitter users. Sunbelt reveals …

ZeuS vs. Zeus Killer

Back at the beginning of February, we wrote about the SpyEye toolkit and its author’s intention of encroaching upon Zeus toolkit’s turf by offering a feature that …

Fake gift card scams on Facebook

Whole Foods Market, a Texas supermarket chain, has been fighting the latest gift card scam that takes advantage of the company well-known brand by offering a $500 gift card to …

How to detect a phishing site, the Google way

Google analyzes millions of pages per day when searching for phishing behavior. This kind of activity is, of course, not done by people but by computers. The computers are …

Global response to Conficker threat: Model for future cyber threat response?

The problem with Conficker is that we still don’t know what it’s for. Yes, an estimated 7 million computers are infected worldwide, but they don’t show signs …

Silent auto-patching for Flash plug-in within Chrome

The exhausting, continuous patching of software will, hopefully, some day come to an end. I seriously doubt it will be because of flawless code, but the possibility of having …

1,800 Office bugs discovered by Microsoft’s “fuzzing botnet”

Distributed Fuzzing Framework is what they call it at Microsoft, and it’s the realization of an idea that originated with one of the software designer engineers of its …

Stalker jailed for planting child porn on a computer

An elaborate scheme to get the husband of a co-worker he was obsessed with locked up in jail, backfired on Ilkka Karttunen, a 48-year from Essex. His plan was to get the …

Hacked Yahoo email accounts in China and Taiwan

Yahoo email accounts of several journalists and human activists have been hacked and their contents likely downloaded in what seems like an organized attack concentrated on …

Breached companies are not entitled to anonymity

Does the recent decision by District Judge Douglas Woodlock – to unseal the identities of two companies (J.C. Penney and Wet Seal) whose customer data has been stolen by …

Researcher exploits PDF file without using a vulnerability

Didier Stevens, security researcher and expert on malicious PDF files, has succeeded in creating a proof-of-concept PDF file that uses the launch action triggered by the …

Don't miss

Cybersecurity news