cybercriminals
Twitter underground economy still going strong
The Twitter underground economy and the fake social account market as a whole continues to gain momentum, and the financial motivations of this multimillion-dollar business …
Android hack tool harvests info from PCs
Stealing information is a piece of cake if you can manage to get malware on the target’s Windows computer, but did you know that it can also be as easy as connecting …
Hacker indicted for Romney tax return extortion scheme
34-year-old Michael Mancil Brown of Franklin, Tennessee, was indicted today by a federal grand jury in Nashville, for allegedly engaging in an extortion and wire fraud scheme …
Beware of “Social Security” Facebook phishing scams
Hijacked Facebook Fan Pages are a great asset to online spammers and scammers, so it’s no wonder that at any given time there are a number of active phishing campaigns …
Combating attacks with collaborative threat intelligence
Advanced Persistent Attacks (APTs) get most of the attention from the cyber security community because, as defenders, we want to be vigilant against the most insidious …
FDA shut down 1,677 illegal pharmacy websites
The U.S. Food and Drug Administration, in partnership with international regulatory and law enforcement agencies, took action this week against more than 9,600 websites that …
Citadel Trojan automatically localizes fraud content
Any successful business knows that it cannot rely solely on one market for future growth. Software companies often conduct business in multiple international markets and …
Confirmed: Carberp source code leaked
It has been confirmed: the password-protected ZIP file that is currently sold on a number of underground forum does indeed contain the source code of the infamous Carberp …
Blizzard suspends mobile app access following account hijacks
A number of World of Warcraft players have been unpleasantly surprised this last week to find that someone has apparently broken into their accounts and bought low-level items …
Researchers reveal tricks for Cutwail’s endurance
While some botherders have opted for the arguably much safer P2P architecture in order to assure their botnets’ resilience, others are still clinging to the standard …
Android fake AV demands ransom, crashes
Fake AV software and ransomware are old news for computer users, but are now poised to become a problem for smartphone users as well. Symantec researchers have recently …
Phishing attacks impacted 37.3 million users last year
37.3 million users around the world were subjected to phishing attacks in the last year, which is a massive 87 percent increase for the number of targeted user in 2011-2012. …
Featured news
Resources
Don't miss
- How military leadership prepares veterans for cybersecurity success
- Fighting fraud with AI: The new identity security playbook
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)