Please turn on your JavaScript for this page to function normally.
Twitter underground economy still going strong

The Twitter underground economy and the fake social account market as a whole continues to gain momentum, and the financial motivations of this multimillion-dollar business …

Android hack tool harvests info from PCs

Stealing information is a piece of cake if you can manage to get malware on the target’s Windows computer, but did you know that it can also be as easy as connecting …

Hacker indicted for Romney tax return extortion scheme

34-year-old Michael Mancil Brown of Franklin, Tennessee, was indicted today by a federal grand jury in Nashville, for allegedly engaging in an extortion and wire fraud scheme …

Beware of “Social Security” Facebook phishing scams

Hijacked Facebook Fan Pages are a great asset to online spammers and scammers, so it’s no wonder that at any given time there are a number of active phishing campaigns …

Combating attacks with collaborative threat intelligence

Advanced Persistent Attacks (APTs) get most of the attention from the cyber security community because, as defenders, we want to be vigilant against the most insidious …

FDA shut down 1,677 illegal pharmacy websites

The U.S. Food and Drug Administration, in partnership with international regulatory and law enforcement agencies, took action this week against more than 9,600 websites that …

Citadel Trojan automatically localizes fraud content

Any successful business knows that it cannot rely solely on one market for future growth. Software companies often conduct business in multiple international markets and …

Confirmed: Carberp source code leaked

It has been confirmed: the password-protected ZIP file that is currently sold on a number of underground forum does indeed contain the source code of the infamous Carberp …

Blizzard suspends mobile app access following account hijacks

A number of World of Warcraft players have been unpleasantly surprised this last week to find that someone has apparently broken into their accounts and bought low-level items …

Researchers reveal tricks for Cutwail’s endurance

While some botherders have opted for the arguably much safer P2P architecture in order to assure their botnets’ resilience, others are still clinging to the standard …

Android fake AV demands ransom, crashes

Fake AV software and ransomware are old news for computer users, but are now poised to become a problem for smartphone users as well. Symantec researchers have recently …

Phishing attacks impacted 37.3 million users last year

37.3 million users around the world were subjected to phishing attacks in the last year, which is a massive 87 percent increase for the number of targeted user in 2011-2012. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools