Please turn on your JavaScript for this page to function normally.
Life of a Chinese hacker

Majia is in his early twenties, and is a college graduate with a degree in engineering. During the day, he works at a government agency. But at night, he is free to follow his …

Keeping World of Warcraft accounts safe

Blizzard Entertainment is taking seriously the string of account hijacking that had as a target its World of Warcraft users in the last few years. It is only normal, since the …

Off-Twitter phishing attack explained

The mystery of the off-Twitter phishing attack, due to which some account passwords have been reset by the service, has been solved. Del Harvey, Director and leader of …

1,400 personal records stolen from Columbia College

Three notebook computers were stolen two weeks ago from an office at the Columbia College, containing personal information, including social security numbers, of 1,400 of …

Black hat hackers on demand

Everybody knows that malicious hacking is illegal, but there are services out there that seem not very concerned with the fact. Some of them have been operating for 3 years …

Five months to detect a breach

When it comes to cyber attacks and breaches, the hospitality industry has been the most heavily targeted industry in 2009. This surprising information is among the findings …

Google applicants targeted by phony job application response

People who have applied for a position at Google are in danger of being duped by a malicious email purporting to come from Google, thanking the recipients for sending in their …

Inside Cyber Warfare: Mapping the Cyber Underworld

The latest attacks and intrusions on networks of US companies and the speculation about their origins have surely made cyber war a distinctly possible reality in the minds of …

Twitter users asked to reset their passwords after phishing attack

Many Twitter users have been locked out of their accounts today, following a suspected phishing attack. They received a message stating: “Due to concern that your …

Beware of Chinese bearing gifts

UK businessmen have been warned by the British security service against using “gifts” such as memory sticks or cameras given to them when attending exhibitions or …

A closer look at Gili USB Stick Encryption 2.0

USB flash drives are the most popular way to move data from one PC to another. They are easy to use, convenient, affordable, but at the same time they pose a security risk and …

Facebook tops the list of risky social networking sites

Social networks may represent one of the most common infection and data loss vectors today, but it’s patently obvious that they are here to stay. Looking at them from a …

Don't miss

Cybersecurity news