Lucrative business: cybercrime-as-a-service
With news of the struggling high street becoming a regular occurrence, it is not surprising that increasingly small businesses are seeking opportunities online. However …
Firm found using browser plugins to inject unauthorized ads on YouTube
Sambreel, a California-based firm that nearly two years ago has been found using browser plugins to deliver ads by injecting them into Facebook and Google pages, is up to its …
Malicious ads lead to outdated adware-laden Firefox “update”
A series of Internet campaigns pushing bogus Firefox updates onto unwary users have been spotted by researchers, and among them is one that lures them in through “Green …
Beware of bogus Facebook account hack tool offer
If, for whatever reason, you wish to hack into someone else’s Facebook account, searching online for ways to do it will likely bring you grief. Take for example a …
Expect more Android security issues in 2013
Android vulnerabilities, increased online banking threats and availability of sophisticated, inexpensive malware toolkits are among the growing concerns cited in Trend …
Cybergangs alter infrastructure abuse techniques
Phishing attack frequency declined 20 percent from Q4 2012 to Q1 2013, due to a precipitous drop in virtual server phishing attacks. APWG statistics indicate that phishing …
How to spot and avoid SMS scams
2013 has been touted by Gartner as the year when mobile phones will overtake PCs as the most common Web access device worldwide. When you think about it, it’s logical, …
Spammers adapt and embrace popular themes
According to Kaspersky Lab, the percentage of spam in email traffic in June was up 1.4 percentage points and averaged at 71.1 per cent. Malicious attachments were found in 1.8 …
FTC crackdown on “free gift card” scammers
The FTC has moved to shut down an international network of scammers that sent millions of unwanted text messages to consumers, using the lure of “free” gift cards …
The future of phishing: Credit card redirection
Cyber crooks will go at great lengths to get their hand on users’ credit and debit card information. Usually they try to trick them with spoofed emails that lead to …
Malicious apps exploiting Android “Master Key” bug found
Malicious apps misusing on of the two recently discovered Android “Master Key” bugs to successfully pose as legitimate ones have been discovered on third-party …
Ponzi scheme involving Bitcoin exposed
The Securities and Exchange Commission charged man and his company with defrauding investors in a Ponzi scheme involving Bitcoin, a virtual currency traded on online exchanges …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)