Please turn on your JavaScript for this page to function normally.
The state of cyberwar in the U.S.

As a country that is used to being dominant in the more traditional sense, the U.S. has been working to come to grips with a new sense of supremacy as a result of cyber …

Compromised DreamHost-hosted websites lead to scams

Hundreds of websites hosted by DreamHost have been compromised and are used to redirect users to a Russian scam page, warns Zscaler. Whether or not this is the result of the …

Server-side polymorphic Android apps

Server-side polymorphism as a technique to serve unique malware versions that evade signature-based detection to Windows users is used by many malware peddlers on a regular …

VeriSign hack: Reactions from the security community

VeriSign admitted it was hacked in 2010 and cannot identify what data was stolen. Below are comments on the situation that Help Net Security received from industry veterans. …

Malware redirects bank phone calls to attackers

Trusteer have discovered a concerning development in some new Ice IX configurations that are targeting online banking customers in the UK and US. Ice IX is a modified variant …

Fake Tumblr Staff Blog offers still targeting users

A week ago, compromised Tumblr accounts were sporting fake messages from a “Tumblr Staff Blog” offering Starbucks gift cards in return for completing surveys and …

Compromised WordPress sites lead to Phoenix exploit kit

Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …

Keeping on top of financial malware

A lot of people are apprehensive about buying things and accessing their bank accounts online. It is an understandable fear, especially when one is aware that it takes just a …

Students used keyloggers on school computers, changed grades

Three Californian 16-year-olds have been arrested for having allegedly broken into their high school, stolen keys and tests, installed keyloggers onto teachers’ …

Facebook scammers leverage the Amazon Cloud

Survey scams have been targeting Facebook users for longer that they would wish. The goal of all of them has always been to make users fill out survey, but the lures and …

Web attacks peak at 38,000 an hour

Web applications are subject to business logic attacks, according to a report by Imperva. Imperva monitored and categorized attacks across the internet targeting 40 different …

Compromised Tumblr accounts sporting fake Starbucks gift cards

It is a well known fact that compromised legitimate websites are often used by cyber crooks to drive traffic towards their scammy sites. The latest example of this practice …

Don't miss

Cybersecurity news