cybercriminals
Fake Amazon smartphone shipping confirmation leads to malware
The gift-giving holidays are almost over, but shopping online is an all-year-round activity for many users and they are often warned to be careful when indulging in it. …
Analysis of Facebook attacks
Commtouch published a comprehensive analysis of scores of malicious Facebook activities during the past year. Affiliate marketing sites are the final destination in …
Data-stealing malware growth spikes
The propagation of some forms of crimeware surged in the half-year period ending in June, 2011 with data-stealing malware reaching and maintaining a new plateau of contagion, …
Ways to avoid falling victim to scams
With the holiday season upon us, more companies are sending customers information about great deals for last-minute shopping. Unfortunately, among those exciting offers comes …
Fake eBay pages offering iPhone 4S for half the price
As more and more people take advantage of the option of buying things online, and especially during the holiday season, cyber crooks continually devise new schemes to trick …
Ransomware impersonating European police agencies
Ransomware has been around for quite some time and likely won’t disappear soon, as it usually does manage to make inexperienced users fork over to the criminals quite a …
Visa probes into potential card processor security breach
Credit card company Visa has announced that it has been informed of a potential data security breach at a European payment processor and that it has mounted an investigation …
Key security threats in the coming year
The widespread adoption of mobile devices, proliferation of applications and growth of cloud computing are helping accelerate business innovation and social benefits. However, …
GlobalSign reports CA infrastructure wasn’t compromised
When the self-styled ComodoHacker – who also claimed responsibility for the DigiNotar hack – boasted that he had access to GlobalSign’s “entire …
The rise of social media abuse and mobile malware
IID released its list of the top security trends from 2011. Some specific trends that IID saw emerge over the past year include the extended enterprise coming under assault, …
Nitro attackers still at it, mock Symantec
Back at the beginning of November, Symantec researchers made public a report they compiled on a spear phishing campaign carrying a backdoor Trojan that was systematically …
Holiday travel is risky business for mobile devices
The holidays are a time for tropical getaways, traveling to Grandma’s house to see family and friends and one of the likeliest times a person will lose their mobile …
Featured news
Resources
Don't miss
- AWS CISO explains how cloud-native security scales with your business
- Product showcase: Apricorn Aegis NVX, a high-security, portable SSD
- How to build and grow a scalable vCISO practice as an MSP
- Global OT cyber risk could top $329 billion, new report warns
- Netscaler vulnerability was exploited as zero-day for nearly two months (CVE-2025-6543)