Banker pleads guilty to sharing personal information of account-holders
LeRoy Brown, a former personal banker from Washington, D.C., pled guilty to conspiracy to commit bank fraud for his role in an identity theft scheme involving $121,400 in …
New cybercrime monetization methods
AVG’s new report investigates a number of malicious software developments including the newly launched 2.0 version of the Blackhole Exploit Toolkit, the evolution in …
Beware of fake Facebook emails about offensive comment
If you receive an email seemingly sent by Facebook, sharing an offensive comment that has seemingly been left on your Wall by an unknown user, please don’t be tempted to …
Bogus MS “Windows license delivery” email leads to malware
A fake Microsoft email is doing rounds, tempting users to follow the offered link that “delivers” a license for the Windows OS: Experienced users will probably …
Worst passwords of 2012
Just in time for Halloween comes something that might scare anyone who spends a lot of time online: SplashData’s annual list of the most common passwords used on the …
Phishing websites proliferate at record speed
A new phishing survey released by the Anti-Phishing Working Group (APWG) reveals that while the uptime of phishing websites dropped during the first half of 2012, …
Most effective ways to stop insider threat
Imperva examined the psychological, legal and technological tactics employed by leading organizations to mitigate insider threats, a class of enterprise risk perpetuated by a …
Qualys extends QualysGuard Cloud Platform
Qualys announced that QualysGuard Vulnerability Management will now feature vulnerability prediction capabilities within a new dashboard and threat reports for zero-days and …
Entrust IdentityGuard delivers mobile smart credentials
To enable organizations to secure and leverage mobile devices in the wake of BYOD trends, Entrust extends its identity-based security platform with Entrust IdentityGuard …
Weak crypto allowed spoofing emails from Google, PayPal domains
Zach Harris, a Florida-based mathematician, discovered that Google and many other big Internet companies use weak cryptographic keys for certifying the emails sent from their …
CyanogenMod found logging Android unlock swipe gestures
CyanogenMod, one of the most popular modified Android firmware on the market, has been found containing code that logs the swipe gestures used by the users to unlock their …
Bogus Twitter DMs lead to iPad scam, surveys and phishing
Yesterday’s unveiling of the iPad Mini has not lead to a decrease in desirability of its bigger version, and the offer of a free device is still a very effective lure …