Please turn on your JavaScript for this page to function normally.
Windows 8 users open to Flash exploits

Users who have downloaded and are using the “Release To Manufacturing” version of Windows 8 or the 90-day trial version of Windows 8 Enterprise should be aware …

Zero-day-loving Google hackers furiously active in last three years

The hackers behind the Aurora attacks that were discovered targeting Google, Adobe and other big U.S. companies in 2009 have seemingly been working hard ever since. Symantec …

Spoofed Microsoft notification leads to Zeus

Microsoft has updated its Services Agreement last week, and has begun notifying its users about the change via email. Eager to take advantage of any kind of legitimate opening …

Java 0-day exploit served from over 100 sites

The problem of the two unpatched Java zero-day vulnerabilities that are actively exploited in the wild by attackers looking to gain access to their targets’ computers is …

Java 0-day exploit added to Blackhole kit, still no news about patch

The recently discovered Java zero-day flaw that has been spotted being used in limited targeted attacks in the wild has created quite a stir. A module that exploits the …

Critical Java 0-day flaw exploited in the wild

Researchers from security firm FireEye have discovered targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting …

Google announces $2 milion in prizes for Pwnium 2

Following the announcement that it will be upping the monetary rewards given to security researchers that responsibly disclose Chromium vulnerabilities, Google has announced …

Bogus “Your eBay funds are cleared” email leads to exploits

Following the email supposedly sent by an unsatisfied customer, eBay sellers are targeted by scammers once again. While the first email threatened with negative feedback, this …

Bogus wire rejection notices lead to exploit kit

Fake notices about a rejected wire transfer have been hitting inboxes around the world, trying to trick recipients to download the attached malicious file, Sophos warns. The …

Fake Facebook photo tag notification leads to malware

Beware of fake Facebook emails telling you that you’ve been tagged in a photo, as you could easily end up infected with malware. The emails do visually resemble messages …

The use of exploit kits changed spam runs

Spammers used to depend on email recipients to tie the noose around their own necks by inputing their personal and financial information in credible spoofs of legitimate …

Microsoft revokes 28 of its code-signing certificates

The long awaited patch for the CVE-2012-1889 vulnerability that has been heavily exploited in the wild and the exploit for which has even been included in the Blackhole …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools