Lone hacker owns the Comodo certificate compromise
Last week’s revelation that a Comodo affiliate Registration Authority has been compromised and that nine rogue SSL certificates have been issued for popular domains such …
Last week’s revelation that a Comodo affiliate Registration Authority has been compromised and that nine rogue SSL certificates have been issued for popular domains such …
Cybercriminals understand there is greater value in selling a corporations’ proprietary information and trade secrets which have little to no protection making …
Late last week, the Rustock botnet was downed by Microsoft and the US Marshals Service after they received permission from the US District Court for the Western District of …
The number of cyber attacks against federal government systems and networks has increased nearly 40 percent, says in the annual report on federal cybersecurity efforts …
Today is the first day of the first EU summit that takes place under the Hungarian presidency, and European leaders have gathered in Brussels to discuss matters such as the …
Facebook survey scammers rarely deviate from the well-beaten path that includes luring the users in with shocking content or promises of seeing who views their profile, making …
A new Japanese disaster themed campaign is doing the rounds of inboxes. The e-mails supposedly offer links to videos about “The village that escaped the tsunami”, …
Unfortunately many cyber crooks are exploiting the tragedy in Japan to get money for unsuspecting surfers. Here are tips from Enigma Software to make sure you don’t …
The earthquake/tsunami/nuclear reactor explosion situation in Japan is currently being exploited by cyber scammers in a great variety of ways, but among the things that I …
It didn’t take long for malware pushers to take advantage of Internet users’ hunger for news and videos from Japan after it was hit today by the most powerful …
Working with cloud-based services significantly improves economies of scale – for cybercriminals too, according to Commtouch. Phishers are already benefiting from free …
Malware authors have begun to set their sights on mobile device users, as witnessed by the latest Trojans made for Android-running devices, on official and unofficial online …