Please turn on your JavaScript for this page to function normally.
Spam campaign bypasses Gmail filters, employs Google Docs

Every now and then, online crooks and spammers use Google Docs to host phishing forms or documents with embedded malicious links. One such spam campaign is currently …

Top 5 Android malware families

On November 15, Gartner issued a report that cited Google’s Android mobile operating system had reached a global 52.5% smart phone market share, while iOS trailed in …

Anonymous bloggers in danger of being exposed

You’re a blogger who, for whatever reason, wishes to remain anonymous. You are careful not to mention anything that could tie the blog to you, and you have gone through …

Bogus chat spying Facebook app targets users

No matter how often fake “See who viewed your profile” apps are touted on Facebook, there are always users that fall for the trick and follow the steps required by …

Why do malicious Android apps come from China?

It seems like every time we hear about a malicious application aimed at Android users, it is always distributed by third-party Chinese app markets. You might wonder why the …

Android malware is stealing your data

The second half of 2011 has been an active one for cyber criminals, who have been increasingly looking for chances to set up new scams in the mobile device environment. …

Manage all mobile devices from one destination

Lookout Mobile Security offers security protection and find-my-phone functionality to all tablet devices, including all Honeycomb and Ice Cream Sandwich Android devices, in …

Bug allows remote code execution in Chrome

In September ACROS Security notified Google about a peculiar behavior of the Chrome browser that can be exploited for execution of remote code outside Chrome sandbox under …

Hardened Android kernel to be used by U.S. Army, government

The U.S. government is looking at replacing radio communication between federal, state and local law enforcement and response agencies with communication with smartphones, and …

Beware of bogus Gmail Hacker software

Hacking into someone’s mail account can be easy if the person chose an easily guessable password, but could be nigh impossible to brute force it if it’s long and …

The state of hacked accounts

Most users get hacked at high rates even when they do not think they are engaging in risky behavior, with 62% unaware of how their accounts had been compromised, according to …

Picasa Web Albums and Yahoo! Groups are loved by spammers

Cyber crooks and spammers are always on the lookout for ways to reach and victimize the largest amount of individuals possible. And sometimes even Internet giants such as …

Don't miss

Cybersecurity news