FTC amends telemarketing rule to ban payment methods used by scammers
The Federal Trade Commission has approved final amendments to its Telemarketing Sales Rule (TSR), including a change that will help protect consumers from fraud by prohibiting …
Phishers are targeting millions of DHL customers
As the end-of-the-year holidays are quickly approaching, people are starting to order more things (read: gifts for themselves and loved ones) online so that they can avoid the …
Google debuts customized warning for social engineering sites
Google Chrome users will from now on be faced with a new, customized warning every time they visit a website/page that contains social engineering content:“The threat …
Beware of Apple-themed phishing emails threatening to limit your account
A new email phishing campaign is targeting businesses and consumers who have Apple IDs, trying to get them to enter their Apple login credentials, personal and credit card …
The Economist urges readers to check it they were saddled with malware
Popular UK-based news outfit The Economist – or rather, some of its online readers – have become the latest confirmed victims of an attack executed by hacking …
XcodeGhost gets updated, now hits also US users
The XcodeGhost threat is far from over, and iOS users are still in danger of unknowingly using apps infected with it, FireEye researchers have warned.“After monitoring …
Android infostealer masquerading as MS Word document
A clever Android information-stealing piece of malware is lurking on third-party app markets popular with Chinese users.“The malware portrays itself as a data file with …
UK dating fraud victims lost £33,5 million last year
Action Fraud, UK’s national fraud and Internet crime reporting centre, and the City of London Police have started a Twitter campaign with the aim of teaching people …
12 new malware strains discovered each minute
G DATA researchers discovered a 64.8 percent spike of new malware strains as compared to the first half of 2014. This averages out to 12 new strains per minute. In all, the …
Tech support scammers start targeting users of Apple devices
With the rise of popularity and the widespread ubiquity of devices made by Apple, it was only a matter of time when tech support scammers would begin targeting that ever …
Malicious Google Chrome clone eFast serves ads, collects info
A Google Chrome lookalike browser dubbed eFast is being actively pushed onto users. The software is at best annoying and unwanted, and at worst can lead users to …
Attackers take over org’s OWA server, harvest domain credentials with malicious DLL
Researchers from cyber attack detection and response outfit Cybereason have discovered a novel APT technique that was used by attackers to gain persistence in an (unnamed) …
Featured news
Resources
Don't miss
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do
- Product showcase: Secure digital and physical access with the Swissbit iShield Key 2