Please turn on your JavaScript for this page to function normally.
Researches test resilience of P2P botnets

Following increased efforts by a number of companies and organizations, the takedown on botnet C&C servers is now a pretty regular occurrence and cyber crooks have …

U.S. Veterans Affairs Dept. repeatedly targeted by foreign hackers

Conflicting claims were heard at Tuesday’s hearing of the House Veterans’ Affairs oversight and investigations subcommittee, leaving open the question on whether …

Most businesses experienced a mobile security incident

79% of businesses had a mobile security incident in the past year, in many cases incurring substantial costs, according to Check Point. The report found mobile security …

FBI warns car buyers against scammy online deals

If you are looking to buy a car or other vehicle online, be careful not to fall for a scam that has lately had a resurgence and that will leave you without money and possibly …

Profiling modern hackers: Hacktivists, criminals, and cyber spies

Sun Tzu, the renowned military strategist and author of The Art of War, was known for the saying, “Know thy enemy and known thyself, and you will not be imperiled in a …

DNS anomaly detection: Defend against sophisticated malware

Not so long ago, the standard way of looking for a malware infection was to simply monitor web traffic. By looking, for example, for HTTP requests to google.com/webhp – …

Zeus variants are back with a vengeance

After analyzing the feedback from the company’s Smart Protection Network, Trend Micro researchers have noted an upswing in attempted Zeus / Zbot Trojan infections. After …

Facebook phishers target Fan Pages owners

Phishing emails claiming to come from “Facebook Security” are once again hitting users’ inboxes, and this time they are aiming for the big fish: pages that …

Cyber espionage campaign uses professionally-made malware

Trend Micro researchers have discovered a new, massive cyber espionage campaign that has been hitting as many as 71 victims each day, including government ministries, …

Form-grabbing rootkit sold on underground forums

There seemingly no end to the automated tools that aspiring cyber crooks can buy on underground forums. The latest of these discovered by Webroot’s Dancho Danchev is …

“Get free followers” scam targets Instagram users

If a service is popular, you can be sure that scammers and spammers will find a way of targeting as many of its users as they can. Trend Micro fraud analyst Karla Agregado …

Targeted data stealing attacks using fake attachments

ESET has uncovered and analyzed a targeted campaign that tries to steal sensitive information from different organizations, particularly in Pakistan (with limited spread …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools