Please turn on your JavaScript for this page to function normally.
20 critical Apple vulnerabilities to be revealed

Charlie Miller, the security researcher renowned for hacking Apple products during many a hacking competition, will be making public (at the CanSecWest security conference …

Fake PIN pad units in US chain store

As soon as we got used to the idea that we have to be very careful when using ATMs because they might be “skimming” devices attached onto them, we have to …

Chrome unique IDs removed after first update

Google decided to appease privacy advocates by making the “unique ID” feature “disappear” when the Chrome browser checks for updates for the first time …

Facebook removes “stalker” apps

A short-lived resurgence of “stalker” applications was promptly squashed by Facebook a few days ago when many users received notifications or wall posts from their …

Mac OS X ransomware – just a matter of time?

For years now, IT experts have been predicting the advent of threats to Mac users that would mirror those faced by the Windows-using crowd. While Mac malware does exist, and …

Vast online data leak in South Korea

South Korean retailer Shinsegae and 24 other companies have been breached and private data on 20 million customers has been stolen, forcing the Ministry of Public …

The rise of amateur-run botnets

It used to be that cyber criminals were people with a highly technical skill set, but this is not the norm anymore. This fact became obvious some two weeks ago when news of …

News of Corey Haim’s funeral lead to fake AV

Corey Haim’s death is old news by now, but fans of the prematurely deceased teen idol are still on the lookout for information concerning his death. Those interested in …

The threat landscape is changing, AV fails to adjust

A recent testing conducted by NSS Labs presented us with some deplorable results: of the seven antivirus products tested two weeks after the IE bug used for breaching Google …

Playstation emulator installs malware

Playing again the games you used to amuse yourself with for hours some years ago could bring a smile to your face, but it could also get your computer infected. Searching for …

Exploit for IE 0-day flaw published, patch still unavailable

An Israeli hacker has created an exploit for the IE zero-day flaw that Microsoft warned about on Tuesday, and the code is already being inserted into the Metasploit Framework. …

Targeted attacks exploiting PDF bugs are soaring

Adobe is having a hard time fighting its bad reputation when it comes to products riddled with vulnerabilities. Adobe Reader exploits seem the weapon of choice of many a cyber …

Don't miss

Cybersecurity news