Please turn on your JavaScript for this page to function normally.
Thanksgiving scams: Warming up for Christmas

Sometimes it is difficult to tell the difference between legitimate online offers and malicious spam. In this day and age, you can be pretty sure that financial and government …

iPhone anti-virus software: Has the time come?

Anti-virus software has already been made available for various mobile phones. Security firm F-Secure offers protection for phones with Windows Mobile and Symbian and …

5 handy WordPress security plug-ins, part 2

If you’re one among the millions of users of WordPress, and you really don’t have that much knowledge about what’s going on under the hood, your best bet to …

Skype users targeted by Koobface look-alike

Trend Labs warn about a seeming Koobface variant – TROJ_VILSEL.EA – that targets Skype. It steals information from the user’s Skype profile: login …

Top 5 Firefox add-ons: Security testing and assessment

Test your sites and web applications and perform a security assessment/audit of your work with these handy tools: 1. Tamper Data Use it to view and modify HTTP/HTTPS headers …

Macbook Air prize spam delivers malware

A good rule of thumb when it comes to unsolicited email offers or announcements should be: If it’s too good to be true, it probably is. Add to this grammatical and/or …

Cloud computing pros and cons

Cloud computing – what is it exactly and what benefits does it bring? A new white paper from ISACA describes how enterprises can achieve greater efficiencies and …

IE8 exposes sites to XSS attacks

It’s a little bit ironic when the thing that you put in place to protect you from certain attacks, it’s the thing that, in the end, makes you vulnerable to them. …

MySpace phishing and malware combo

F-Secure warns about phishing emails that urge users to update their MySpace accounts. If you fall for the trick and follow the link, you are taken to a fake MySpace page, …

Trend Micro blocks phishing attempt from “Trend Micro”

It must have been a special pleasure for Trend Micro to block access to the phishing URL and domain that used their name and reputation to scam people. Their analysts came …

FBI’s network against cyber crime

Last week, when the Senate’s Subcommittee on Terrorism and Homeland Security held a hearing entitled “Cybersecurity: Preventing Terrorist Attacks and Protecting …

iPhone worm turns devices into zombies

It took three weeks for someone to again take advantage of the vulnerability that leaves the owners of jailbroken iPhones exposed to attacks, and this time the attack is …

Don't miss

Cybersecurity news