Zeljka Zorz
Rogue AV misuses VirusTotal’s name
Using well-known names and brands in order to elicit trust in potential victims is a tried-and-true technique used by online criminals, and this latest malware-pushing scheme …
Facebook rolls out mobile privacy
Facebook is aware that users are becoming increasingly mobile, and to help them to change their privacy settings while on the go, privacy controls are now accessible from any …
Firefox 4.0 beta download scam on Twitter
A Twitter update hash-tagged “Firefox” spotted by Sunbelt offers a unique opportunity: follow the offered shortened link to download a cracked Mozilla Firefox 4.0 …
ZeuS variants hide behind snatched certificates
Copying certificates from legitimate files and mimicking signatures from certificate authorities is certainly not a new tactic in the cybercriminals’ arsenal, but is one …
Phishers target mobile phone users
Mobile phone users in the UK and Norway have been targeted by malicious emails purporting to come from their mobile service providers, claiming that the users have to confirm …
iPhone jailbreaking technique paves way for attacks
Since jailbreaking iPhones has been declared legal, security experts have been focusing on the techniques used and speculating about the fact that they can be used by …
Facebook woes of less careful users
Until Facebook manages to think of a way to head off various scams when they first appear, users should hone their skills of detection and teach themselves to refrain from …
The hidden message in Toy Story 3 is a Facebook scam
The latest scam to hit Facebook users takes advantage of the recently released Toy Story 3: Sophos reports that from the moment you click on the link, the scam follows a well …
Project Vigilant searching for volunteer hackers at Defcon
Project Vigilant, a division of BBHC Global LLC (an information security firm), is a private, semi-secret, volunteer-based organization of “cyber spies” that is …
Microsoft patches the critical Windows LNK vulnerability
An emergency out-of-band update for patching the critical LNK vulnerability has been released by Microsoft. “The vulnerability exists because Windows incorrectly parses …
Big firms fail the test as social engineers demonstrate their abilities at Defcon
The social engineering capture-the-flag-style contest planned for the second and third day of this year’s edition of Defcon was executed without a hitch. No financial …
Q&A: SOURCE Barcelona
Stacy Thayer is the Founder and Executive Director of SOURCE Conferences. Prior to founding SOURCE Conferences, Stacy was employed for a Fortune 500 company, where she worked …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise