Please turn on your JavaScript for this page to function normally.
Wikipedia-like sites peddling fake pharmaceuticals

Wikipedia is practically a household name now, so it’s no wonder that spammers are trying to take advantage of the online encyclopedia’s popularity and (relative) …

Breaches drive enterprises to prioritize access governance

Aveksa announced the findings of a recent survey conducted to examine how companies are re-evaluating their IT security measures following the recent security breaches at …

Hackers steal, publish Fox employee passwords

A group of attackers who clearly have it in for Fox Broadcasting have managed to access a company server with hundreds of their employees’ email usernames and passwords. …

PSN attackers allegedly used Amazon cloud for attack

Attackers (mis)used the Amazon cloud to mount their attack against Sony’s online services and systems, and they did it legally, says Bloomberg. According to an unnamed …

The rise of rogue AV

April saw a continued increase in the volume of detected malware, with 73,000 new variants of threats being released daily – a 26 percent increase over the same period …

Banking Trojan gang busted by Finnish police

Seventeen people were arrested for having taken part in a criminal scheme that targeted users of Finnish Nordea Bank and resulted in fraudulent transactions in the total …

Cyber criminals moving operations to Canada

Cyber criminals are on the move again and, this time, Canada is the prime target. IP addresses in China and Eastern Europe are highly scrutinized and undergoing intense …

Sony suffers third breach, PSN still down

Sony’s troubles seem to have no end as the company confirms a third breach of their network and fails to set a date for the restoration of services. This last breach …

“Time spent on Twitter” scam spreads virally

Facebook users are already accustomed to practically daily offers of rogue apps that will supposedly show them who views their profile or allow them to use a similar feature …

Files uploaded to file hosting services accessed by malicious individuals

File hosting services such as RapidShare, FileFactory, Easyshare and others have a number of flaws that make it possible for unauthorized people to access and download files …

Facebook scam with aggressive spreading mechanism

In a new Facebook scam with an aggressive spreading mechanism, users are informed through the platform’s own notification system and by email that they have been made …

Sony breach due to outdated, unpatched servers?

The congressional testimony before the House Subcommittee on Commerce, Manufacturing, and Trade held yesterday morning has revealed many things that shed a totally different …

Don't miss

Cybersecurity news