Please turn on your JavaScript for this page to function normally.
ZeuS vs. Zeus Killer

Back at the beginning of February, we wrote about the SpyEye toolkit and its author’s intention of encroaching upon Zeus toolkit’s turf by offering a feature that …

Fake gift card scams on Facebook

Whole Foods Market, a Texas supermarket chain, has been fighting the latest gift card scam that takes advantage of the company well-known brand by offering a $500 gift card to …

How to detect a phishing site, the Google way

Google analyzes millions of pages per day when searching for phishing behavior. This kind of activity is, of course, not done by people but by computers. The computers are …

Global response to Conficker threat: Model for future cyber threat response?

The problem with Conficker is that we still don’t know what it’s for. Yes, an estimated 7 million computers are infected worldwide, but they don’t show signs …

Silent auto-patching for Flash plug-in within Chrome

The exhausting, continuous patching of software will, hopefully, some day come to an end. I seriously doubt it will be because of flawless code, but the possibility of having …

1,800 Office bugs discovered by Microsoft’s “fuzzing botnet”

Distributed Fuzzing Framework is what they call it at Microsoft, and it’s the realization of an idea that originated with one of the software designer engineers of its …

Stalker jailed for planting child porn on a computer

An elaborate scheme to get the husband of a co-worker he was obsessed with locked up in jail, backfired on Ilkka Karttunen, a 48-year from Essex. His plan was to get the …

Hacked Yahoo email accounts in China and Taiwan

Yahoo email accounts of several journalists and human activists have been hacked and their contents likely downloaded in what seems like an organized attack concentrated on …

Breached companies are not entitled to anonymity

Does the recent decision by District Judge Douglas Woodlock – to unseal the identities of two companies (J.C. Penney and Wet Seal) whose customer data has been stolen by …

Researcher exploits PDF file without using a vulnerability

Didier Stevens, security researcher and expert on malicious PDF files, has succeeded in creating a proof-of-concept PDF file that uses the launch action triggered by the …

A closer look at Steganos Safe

Steganos Safe creates a password-protected virtual safe to store your photos, music, documents, and more. It also shreds unwanted files permanently and defeats data recovery …

Malware spread fueled by fear of money loss

Cyber crooks have learned long ago that potential targets respond well to scare tactics, and this the kind of social engineering approach that two recent spam campaigns …

Don't miss

Cybersecurity news