Please turn on your JavaScript for this page to function normally.
Facebook and Twitter users targeted with same scam

A Starbucks-themed scam has been spotted targeting users of both Facebook and Twitter users and it does so not via messages sent from compromised accounts, but through spam …

Yet another Trojan based on Spitmo source code surfaces

Even though nearly all new mobile malware in Q3 was aimed at Android phones, users with mobile devices running other mobile platforms are far from safe. F-Secure researchers …

Changing nature of DDoS attacks

The volume of packets-per-second (PPS) has almost quadrupled compared to Q3 2010, illustrating a significant increase in the size and diversity of DDoS attacks over the past …

Expect an escalation in targeted attacks

Organizations and Internet users can expect an escalation in targeted attacks, growing social media threats and an increase in mobile malware, according to the M86 Security. …

What hides behind the get-rich-working-from-home offers?

Do you ever get tempted to click on one of the myriad of work-from-home, get-paid-huge-money adverts that are littering the Internet? Do you ever wonder if those claims are …

Cyber crooks should get tougher sentences, says PCeU chief

Cyber fraudsters and robbers often receive considerably lighter sentences that their real-world counterparts, says Detective Superintendent Charlie McMurdie, the head of …

100% of enterprises reported cyber attacks

Attacks are becoming more difficult to defend against and are expensive to mitigate, with traditional safeguards falling short, according to F5 Networks. With both …

Scammers sending out bogus job offers

Cyber scammers do not hesitate using every scrap of information there is on the Internet in order to gain users’ trust and misuse it for their malicious purposes. Also, …

Block cipher encryption effectively hides banking Trojan

Brazilian malware peddlers have turned to encrypting banking Trojans with block ciphers, effectively bypassing most AV software. Kaspersky Lab’s Dmitry Bestuzhev says …

How does cell phone money laundering work?

In Russia, most cell phone SIM cards are prepaid. One of the major Russian operators offers a legal service that allows anyone to transfer the prepaid amount of money from a …

Cybercriminals exploiting user inexperience

Noteworthy threats in October 2011 included the return of a rogue web browser, a phony hacking tool for Gmail account password recovery and malware disguised as advertisements …

FBI arrests six for DNS hijacking scam worth $14 million

Charges against six Estonian nationals and one Russian national for engaging in a massive and sophisticated Internet fraud scheme that infected with malware more than four …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools