Please turn on your JavaScript for this page to function normally.
A single click can open door to cybercrime

Blue Coat Systems unveiled their 2011 security report that examines Web behavior and the malware to which users are most frequently exposed. The report analyzes Web requests …

1 in 3 EU Internet users infected by malware

The EU has been at the forefront in leveraging IT advancements. The region has a high Internet penetration rate and over two-thirds of the population uses Internet. However, …

Russian hacker steals $10 million

A 27-year old Russian hacker pleaded guilty to stealing $10 million from a former Royal Bank of Scotland division back in 2008, and he’s awaiting a verdict and …

Hedge funds unprepared for cyber attack

With details trickling in about how the sophisticated Stuxnet computer worm derailed years of work on Iran’s nuclear program, many seasoned observers are left to wonder …

A good decade for cybercrime

For Internet users, it has been a decade of exciting online advances that allow people to communicate, share information and conduct business in ways that were never before …

Cybercrime black market statistics

PandaLabs released an investigative report on the current cybercrime black market. They discovered a vast network selling stolen bank details along with other types of …

Cybercriminals shifting focus to non-Windows systems

In a major cybercrime turning point, scammers have begun shifting their focus away from Windows-based PCs to other operating systems and platforms, including smart phones, …

A global shift in cybercrime

The target of attacks has shifted from traditional infrastructure to mobile users and endpoint devices, according to a new report. Research from SpiderLabs found that …

DHS investigation uncovers cyber fraud ring members

Two Winona State University students are currently being investigated by the Department of Homeland Security and are suspected of having been members of a Vietnamese-based …

The evolution of cyber criminal operations

There is a concerning evolutionary step cyber criminal operations are taking to more effectively diversify the distribution of their ill-gotten gains, according to Fortinet. …

Underground toolkits will make cyber espionage easy

With the growing diversity of operating systems among companies, as well as the growing use of mobile devices, cybercriminals should have a very profitable 2011. Their tactic …

Increased collaboration on cybercrime syndicate crackdowns

As 2010 comes to a close, information security companies are trying to predict the amount of problems we’ll have to deal with next year. Below is a list of 5 security …

Don't miss

Cybersecurity news