Please turn on your JavaScript for this page to function normally.
Windows Live ID phishing spam

Joe Wilcox warns of what seems to be an attempt to phish his Windows Live ID and password. Here is the contents of the email purporting to come from the “Windows Live …

The need for global cooperation on cyber security

When the Internet was in its teens, it was hard to imagine it evolving as far as it has. Yesterday I was chuckling over an article from 1995 in which the author adamantly …

Phishers target Blogger users

Users of Google’s Blogger, a free blog publishing tool, are the targets of the latest phishing email campaign: The text of the message couldn’t be simpler, and the …

Warrantless cell phone tracking on the horizon?

There is no doubt about the fact that real time or historical tracking of criminals’ movement via their cell phones can come really handy to law enforcement officers. It …

Twitter users targeted by BZPharma phishing attack

The latest attack on Twitter users took the form of the fascinatingly curiosity-raising phrase “Lol. This you??” and it’s variants “Lol. this is …

School allegedly spied student at home via webcam

Some very disturbing news has surfaced regarding an alleged invasion of privacy in a Philadelphia suburb. An underage student of one of the high schools in the Lower Merion …

Google attacks linked to two Chinese schools

New findings regarding the origins of the January attacks on Google and some twenty other US corporations have come to light, and they point to two academic institutions in …

Botnets, the ever-present threat

Every day, the M86′ Security Labs analyzes over 7 million distinct email messages, looking for patterns and emerging trends. In their recently published report covering …

Imminent flood of smartphone malware?

As this year’s Mobile World Congress held in Barcelona, Spain, is coming to an end, a few important players in the security industry shared their thoughts about the …

Spam recycling: Why fix it if it ain’t broken?

Why take the trouble and waste the time for writing a new email, when the first one did so well? In the latest spam campaign hitting inboxes around the world, cyber criminals …

Mock cyber attack shows US unpreparedness

During the simulated cyber attack that took place yesterday in Washington and was recorded by the CNN, one thing became clear: the US are still not ready to deflect or …

A closer look at System Surveillance Pro 5.5

System Surveillance Pro logs keystrokes, monitors applications, tracks visited websites, records instant message conversations and captures screenshots of the computer …

Don't miss

Cybersecurity news