cybercriminals
Recycled cybercrime tactics adapted to conceal fraud
GFI Software released its VIPRE Report for December 2011, a collection of the most prevalent threat detections encountered during the month. Phishing campaigns once again …
Cyber crooks combine new Zeus variant and DDoS attacks
A new variant of the information-stealing Zeus Trojan – dubbed Gameover – is currently being delivered to unsuspecting victims via emails purportedly coming from …
Zuckerberg giving away free iPads and iPhones?
You might be surprised at receiving what seems to be an email from Facebook CEO Mark Zuckerberg, notifying you that you have been selected to receive both a free Apple iPhone …
Most unusual laptop recovery stories
Absolute Software Corporation takes a look back at some of its most unforgettable computer theft recovery cases. They’ve seen it all – helping local police to …
DotA 2 and Diablo III beta testing crack files carry malware
Gamers are known for their impatience when it comes to trying out updates and new packs for popular games, and cyber crooks are always ready to take advantage of that. …
Over 1M pages compromised in massive SQL injection attack
At the beginning of December researchers from the Internet Storm Center spotted a relatively limited SQL attack – about 80 affected pages – redirecting visitors of …
Online scam susceptibility of American consumers
PC Tools, in collaboration with the Ponemon Institute, announced the findings of its online scam susceptibility study of 1,858 American consumers. The results of the survey …
SpyEye Trojan post transaction fraud schemes attack banks
Many of us tend to spend a little more than we intend during the holiday season and, with all the transactions hitting our accounts, it can be hard to keep track. During the …
Israeli credit card hack creates more opportunities
In a recent data breach incident, a Saudi hacker defaced a prominent sports news web site in Israel and linked its front page to a file exposing the details of many credit …
Fake Amazon smartphone shipping confirmation leads to malware
The gift-giving holidays are almost over, but shopping online is an all-year-round activity for many users and they are often warned to be careful when indulging in it. …
Analysis of Facebook attacks
Commtouch published a comprehensive analysis of scores of malicious Facebook activities during the past year. Affiliate marketing sites are the final destination in …
Data-stealing malware growth spikes
The propagation of some forms of crimeware surged in the half-year period ending in June, 2011 with data-stealing malware reaching and maintaining a new plateau of contagion, …
Featured news
Resources
Don't miss
- Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
- AI is changing cybersecurity roles, and entry-level jobs are at risk
- From cleaners to creepers: The risk of mobile privilege escalation
- Researchers unearth keyloggers on Outlook login pages
- Hackers love events. Why aren’t more CISOs paying attention?