Please turn on your JavaScript for this page to function normally.
Dropbox confirms hack, announces 2-factor authentication

After weeks of investigating how it came about that a sizable number of its European users began receiving spam advertising gambling websites to dedicated (and not) email …

Modern day pirates

Many of you will remember long summer days with the streets filled with laughing children congregating to play football or just hang out with their friends – I certainly …

Personal and financial information under attack

Cybercriminals have increased their focus in targeting individuals and organizations of all sizes to steal personal and financial information according to Trend Micro. Among …

8.2 million Gamigo passwords leaked

When German gaming website Gamigo was breached in February this year, they reacted by sharing the fact with their users, warning that user information such as usernames and …

One in ten SMEs have suffered a data hack

One in ten small businesses in the UK have experienced a data hack. Hiscox research also revealed that 90% don’t have a cyber crime insurance policy in place to protect …

World’s third largest botnet receives mortal blow

Grum, a botnet responsible for 17.4 percent of the world’s spam emails, finally seems to be dead. In the last few days, Dutch authorities have shut down two of the …

Guy steals $80,000 worth of Nike items via website loophole

A former college baseball player from Virginia managed to get his hands on Nike merchandise worth over $80,000 for free after having found and exploited a loophole in one of …

Nearly half a million Yahoo passwords leaked following hack

Some 450,000 email addresses and associated unencrypted passwords have been dumped online by the hacking collective “D33Ds Company” following the compromise of a …

Targeted attacks focus on small businesses

36 percent of all targeted attacks (58 per day) during the last six months were directed at businesses with 250 or fewer employees, according to Symantec. During the first …

US-based machines preferred by malicious pay-per-install networks

Pay-per-install affiliate networks looking for compromised computers to get their malicious wares installed on have a definitive predilection for machines located in developed …

New Android Trojan secretly buys apps

Even though malicious Android apps can occasionally be found on Google Play, Chinese third-party online Android markets are known for offering them by the hundreds, if not …

Massive crime ring automates bank fraud, steals tens of millions

Two-factor authentication schemes have definitely been proven to be ineffectual as news of a massive global financial services fraud campaign that targeted well-moneyed …

Don't miss

Cybersecurity news