Please turn on your JavaScript for this page to function normally.
Ransomware demands survey completion instead of cash

Ransomware has replaced fake AV as the most high-profile and annoying malware targeting computer users around the world, and the approach is always the same: the owners of the …

Looking to the future: Security predictions for 2013

The door is closing on 2012, and it’s time to look ahead to next year. As you round out your 2013 business and IT plans, cybercriminals are resolving to implement …

Israel Police pulled computers offline due to RAT infestation

Trend Micro researchers have managed to get their hands on the malware that caused the Israeli Police Department to pull all of its systems offline last Thursday, and the …

Trojan disguised as image delivered via Skype messages

Skype users, beware of messages like this one: The spamming campaign has surfaced in the last few days and is being propagated via compromised Skype accounts. The offered …

FTC cracks down on international tech support scams

The Federal Trade Commission has launched a major international crackdown on tech support scams in which telemarketers masquerade as major computer companies, con consumers …

White House Military Office breached by Chinese hackers

Following the recent confirmation by a senior intelligence officer with the U.S. Cyber Command that the Pentagon systems and networks are constantly under cyber attacks and …

Twitter messages lead to phishing AND malware

If you have received a private message from another Twitter telling you “lol ur famous now”, have followed it to a fake Facebook page requiring you to log into …

(IN)SECURE Magazine issue 35 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 35 has been released today. Table of contents: …

Online daters targeted by blackmailing scammers

There are all kinds of online scammers. Most of them try to trick users into parting with their hard-earned money on their own accord, but there are also those that prefer a …

Apple, Amazon change their security policies following epic hack

In the aftermath of the spectacular hack that left former Gizmodo employee Mat Honan without access to his Twitter account, his Gmail, his iCloud account and with his iPhone, …

Gizmodo hack reveals worrying flaws in data management policies

Mat Honan, the former Gizmodo employee who’s personal Twitter account compromise resulted in the temporary hijacking of the tech blog’s Twitter account, has …

Gizmodo’s Twitter hijacked following hack of iCloud account

Followers of popular technology weblog Gizmodo have been faced with some very offensive tweets coming from the site’s Twitter account on Friday. Many have accurately …

Don't miss

Cybersecurity news