“Ex-girlfriend sex video” Facebook scam
Survey scammers love targeting Facebook users, because the social nature of the network makes sure that the scam will be propagated far and wide. The latest of these scams has …
Syrian dissidents claim government uses malware to spy on them
Syrian opposition activists have been targeted by the government since the start of the massive anti-government protests in January 2011, but only recently they have began to …
Researchers break video CAPTCHAs, offer solutions
After creating the “Decaptcha” software to solve audio CAPTCHAs, Standford University’s researchers modified it and turned it against text and, quite …
British student jailed for hacking Facebook
26-year-old software development student Glenn Mangham has been sentenced to spend eight months in jail following his hack into several Facebook servers between April and May …
Facebook Gold Membership Status scam hits users
A bizarre email purportedly sent by Facebook has been hitting inboxes around the world and trying to convince the recipients that they have been awarded a “100% Gold …
Security and SLAs, the biggest barrier to cloud adoption
45% of European IT decision makers view a lack of security and service level agreements (SLAs) as top concerns for moving to the cloud, according to a survey by Interxion. …
Trend Micro makes HijackThis open source
Trend Micro released HijackThis as an open source application. The code, originally written in Visual Basic, is now officially available at SourceForge. HijackThis scans your …
Acunetix Web Vulnerability Scanner 8 released
Acunetix Web Vulnerability Scanner 8 (WVS) echoes years of counter-hacking experience through its new ability to lock hackers out by integrating scan results into …
Forensic toolkit with malware analysis technology
AccessData released Forensic Toolkit 4 (FTK) that gives organizations affordable access to more advanced incident response and remote investigative capabilities. Using FTK, …
Week in review: Cheap cellphone tracking, Apple’s Gatekeeper, and Google secretly bypasses Safari’s “no tracking” settings
Here’s an overview of some of last week’s most interesting news and articles: Privacy pitfalls of online dating It used to be that you were pretty much anonymous …
Hackers can find you by tracking your cellphone
Finding out people’s approximate whereabouts by tracing their cellphone signal is something that service providers can easily do, as cellular networks track its …
Cutwail botnet intensifies spam spewing
The old Cutwail botnet is still alive and spamming from its 1,5 million bots, and has lately been spotted using malicious HTML attachments. The spam emails vary from fake …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous