Please turn on your JavaScript for this page to function normally.
Basic security measures do wonders

Deep down inside, we all wish for a unique solution that will protect our machine or our network completely forever and ever, preferably one that can be activated with a …

Twitter tackles phishing problem

In a bid to obstruct the phishing onslaught that has lately been targeting its users, Twitter has announced that it will rout the submitted direct messages through a new URL …

Online banking rip-offs go up, card fraud goes down

Losses due to credit and debit card fraud have fallen for the first time in 3 years, says the UK Cards Association, only to be supplanted by a rising incidence of phishing …

And the winner is – FakeAV!

Taking advantage of the Oscar fever, criminals have poisoned search results regarding the award ceremony. Entering “oscar winners live 2010” you get this: …

UK threatens to retaliate over cyber attacks

Rapidly approaching the point when retaliation against countries suspected of launching cyber attacks and engaging in cyber espionage will be ordered, the UK …

Log review checklist for security incidents

Anton Chuvakin, the well-known security expert and consultant in the field of log management and PCI DSS compliance and author of many books, and Lenny Zeltser, leader of the …

Mariposa bot distributed by Vodafone’s infected phone

Following yesterday’s news about the Energizer DUO USB recharger that infects PCs with a Trojan, here is another piece of equipment whose software comes bundled with …

Setting up a mobile botnet is alarmingly easy to do

The relative easiness of setting up a mobile botnet of nearly 8,000 phones has been demonstrated by Derek Brown and Daniel Tijerina at this year’s edition of the RSA …

“Highly critical” Opera vulnerability discovered

A highly critical buffer overflow vulnerability affecting the Opera browser has been discovered by Marcin Ressel of Secunia: The vulnerability is caused due to an error when …

Serious Apache vulnerability disclosed

A serious vulnerability in Apache’s HTTP web server that enables the attacker to gain remote access to the server and total control of a database, has been discovered by …

There is a social engineering scheme for everyone

The human factor is the weakest link of the security chain – this statement has been said and written so many times, that is starting to become a cliche’. Even so, …

USB battery charger installs Trojan

The software that shows to which extent the battery is charged through the Energizer DUO USB recharger comes bundled up with a Trojan, says US CERT. The installer file for the …

Don't miss

Cybersecurity news