Please turn on your JavaScript for this page to function normally.
Fake browser warnings lure victims to rogue AV solution

Certain compromised websites are detecting which browser (Firefox, Chrome, IE) the visitor is using and present to them a fake malware/reported attack warnings that urge them …

Rescue of Chilean miners used as lure by banker Trojan

PandaLabs uncovered a new malicious code, Banbra.GUC, which lures users with a video about the rescue of the trapped Chilean miners. This is a new variant of the infamous …

Phishing campaign targets McDonald’s fans

A widespread spam campaign that is promising cash in return for completing a McDonald’s customer satisfaction survey has been uncovered. The emails, claiming to be sent …

Cyber crooks steal nearly $1 million from University of Virginia

A theft of nearly $1 million from bank accounts of the University of Virginia’s College at Wise is being investigated by the FBI. While the agency – as per their …

Nagios monitoring system 3.2.2 released

Nagios monitors your entire IT infrastructure to ensure systems, applications, services, and business processes are functioning properly. In the event of a failure, Nagios can …

Acunetix Web Vulnerability Scanner 7 released

Acunetix announced version 7 of its Web Vulnerability Scanner which features a new vulnerability verifying techniques, scanning engine, support for a wider variety of web …

Slovenian Mariposa suspects’ identities revealed

A month has passed since the Mariposa malware author was arrested in Slovenia, and more details about the case have surfaced in the meantime. The Slovenian police says that …

Customer information of drugstore chain exposed

Personal information of 150,000 online customers of the German drugstore chain Schlecker was available online for everyone to access due to an error of the chain’s …

(IN)SECURE Magazine issue 27 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 27 has been released today. Table of contents …

Fake TwitterDeck update infects Twitter users

The recent announcement made by Twitter regarding the switch from basic access authentication to OAuth open protocol on the Twitter API proved to be a godsend to malware …

30 days of 0-days, binary analysis and PoCs

An independent group of security researchers that goes by the name of Abysssec Security Team has announced some two weeks ago its intention of making September a month of …

Cloud security certification from the Cloud Security Alliance

The Cloud Security Alliance’s Certificate of Cloud Security Knowledge (CCSK) is now open for testing. The industry’s first user certification program for secure …

Don't miss

Cybersecurity news