Top cybercrime weapon: Web exploit toolkits

HP identified a significant increase in the volume of organized cybercrime targeting data centers and networks, which can lead to financial and data loss. While there were …

The execution of the RSA hack

More than two weeks have passed since the high profile RSA hack, and the company has finally decided to share some of the details regarding the attack. The question that is …

Recidivist youngster sentenced for new hack

27-year-old Van T. Dinh has been sentenced to three years in prison and ordered to pay $125,000 in restitution for having breached an online currency exchange service …

Pharmaceutical spam and mobile threats dominate

Wannabe cybercriminals were able to execute attacks with impunity and relative ease thanks to toolkits, pre-written software programs designed to steal information, rendering …

Facebook battles likejacking scammers

Facebook and its users have been plagued for a while now by a seemingly never ending steady stream of scams, among which are those that hijack users’ “likes” …

Two more Comodo RAs compromised

The investigation Comodo has mounted following the recent compromise of one of its Registration Authorities and the issuing of rogue certificates for popular sites has …

MySQL.com compromised by SQL injection attack

MySQL.com has been hacked and a part of the database containing member and employee email addresses, usernames and passwords has been published by the hackers on Pastebin.com. …