Please turn on your JavaScript for this page to function normally.
There are no winners in the blame game

Every time a major security breach makes the headlines, a common reaction happens. Even before the details of the breach are known, the infosec world gets into a frenzy of …

New Zeus variant creates bogus Instagram accounts

If you are familiar with the results of a recently finished study regarding online content popularity that concluded that “likes” beget “likes”, the …

Advanced threats to drive growth in new product segment

As hackers have shifted their ultimate goals from disruption and notoriety to financial and intellectual property theft, the tactics they use have changed accordingly. The …

Lucrative business: cybercrime-as-a-service

With news of the struggling high street becoming a regular occurrence, it is not surprising that increasingly small businesses are seeking opportunities online. However …

Analyzing the Fort Disco bruteforce campaign

In recent months, several researchers have highlighted an uptick in bruteforce password guessing attacks targeting blogging and content management systems. Arbor ASERT has …

Advice on Tor use in wake of Freedom Hosting compromise

In the wake of the discovery that someone has compromised Tor hidden services hosted by Freedom Hosting and injected malicious JavaScript aimed at de-anonymizing specific …

Cybercriminals are doing a better job than the companies they target

What can you learn from reading the exploits of the most successful hacking ring ever brought to justice? Recently, the US Attorney’s Office in NJ unsealed their …

Russians responsible for 30% of mobile malware

Lookout investigated 10 Russian-based organizations, uncovering that the mobile malware industry in Russia has become organized and profitable. These malware businesses …

72k people affected by University of Delaware hack

University of Delaware is the latest of the high-learning institutions in the US to have been hit with a cyber attack that resulted in a data breach. According to a …

Security complexity and internal breaches are key concerns

Growth in external hacking attempts, DDoS and malware attacks, and internal threats to data are the key security concerns for UK businesses. 64% of respondents to a Check …

Apple Dev Center partially back online, still no details about the hack

Parts of the Apple Developer Center are back online after a week long outage caused by an unnamed intruder that has “attempted to secure” personal information of …

The future of phishing: Credit card redirection

Cyber crooks will go at great lengths to get their hand on users’ credit and debit card information. Usually they try to trick them with spoofed emails that lead to …

Don't miss

Cybersecurity news