Please turn on your JavaScript for this page to function normally.
Lone hacker owns the Comodo certificate compromise

Last week’s revelation that a Comodo affiliate Registration Authority has been compromised and that nine rogue SSL certificates have been issued for popular domains such …

Intellectual capital is the new cybercrime currency

Cybercriminals understand there is greater value in selling a corporations’ proprietary information and trade secrets which have little to no protection making …

Rustock’s demise linked to Harnig botnet switch off

Late last week, the Rustock botnet was downed by Microsoft and the US Marshals Service after they received permission from the US District Court for the Western District of …

Cyber attacks on US federal networks on the rise

The number of cyber attacks against federal government systems and networks has increased nearly 40 percent, says in the annual report on federal cybersecurity efforts …

Serious cyber attack targets EU institutions on eve of summit

Today is the first day of the first EU summit that takes place under the Hungarian presidency, and European leaders have gathered in Brussels to discuss matters such as the …

Facebook survey scam with a Firefox twist

Facebook survey scammers rarely deviate from the well-beaten path that includes luring the users in with shocking content or promises of seeing who views their profile, making …

Japanese tsunami videos lead to malware

A new Japanese disaster themed campaign is doing the rounds of inboxes. The e-mails supposedly offer links to videos about “The village that escaped the tsunami”, …

5 tips to avoid Japan earthquake and tsunami scams

Unfortunately many cyber crooks are exploiting the tragedy in Japan to get money for unsuspecting surfers. Here are tips from Enigma Software to make sure you don’t …

Twitter spambots advertise “Radiation health” e-book

The earthquake/tsunami/nuclear reactor explosion situation in Japan is currently being exploited by cyber scammers in a great variety of ways, but among the things that I …

Japan earthquake search results already poisoned

It didn’t take long for malware pushers to take advantage of Internet users’ hunger for news and videos from Japan after it was hit today by the most powerful …

Cloud streamlines efficiency of identity theft

Working with cloud-based services significantly improves economies of scale – for cybercriminals too, according to Commtouch. Phishers are already benefiting from free …

Illegal online pharmacies target mobile users

Malware authors have begun to set their sights on mobile device users, as witnessed by the latest Trojans made for Android-running devices, on official and unofficial online …

Don't miss

Cybersecurity news