Fake browser warnings lure victims to rogue AV solution
Certain compromised websites are detecting which browser (Firefox, Chrome, IE) the visitor is using and present to them a fake malware/reported attack warnings that urge them …
Rescue of Chilean miners used as lure by banker Trojan
PandaLabs uncovered a new malicious code, Banbra.GUC, which lures users with a video about the rescue of the trapped Chilean miners. This is a new variant of the infamous …
Phishing campaign targets McDonald’s fans
A widespread spam campaign that is promising cash in return for completing a McDonald’s customer satisfaction survey has been uncovered. The emails, claiming to be sent …
Cyber crooks steal nearly $1 million from University of Virginia
A theft of nearly $1 million from bank accounts of the University of Virginia’s College at Wise is being investigated by the FBI. While the agency – as per their …
Nagios monitoring system 3.2.2 released
Nagios monitors your entire IT infrastructure to ensure systems, applications, services, and business processes are functioning properly. In the event of a failure, Nagios can …
Acunetix Web Vulnerability Scanner 7 released
Acunetix announced version 7 of its Web Vulnerability Scanner which features a new vulnerability verifying techniques, scanning engine, support for a wider variety of web …
Slovenian Mariposa suspects’ identities revealed
A month has passed since the Mariposa malware author was arrested in Slovenia, and more details about the case have surfaced in the meantime. The Slovenian police says that …
Customer information of drugstore chain exposed
Personal information of 150,000 online customers of the German drugstore chain Schlecker was available online for everyone to access due to an error of the chain’s …
(IN)SECURE Magazine issue 27 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 27 has been released today. Table of contents …
Fake TwitterDeck update infects Twitter users
The recent announcement made by Twitter regarding the switch from basic access authentication to OAuth open protocol on the Twitter API proved to be a godsend to malware …
30 days of 0-days, binary analysis and PoCs
An independent group of security researchers that goes by the name of Abysssec Security Team has announced some two weeks ago its intention of making September a month of …
Cloud security certification from the Cloud Security Alliance
The Cloud Security Alliance’s Certificate of Cloud Security Knowledge (CCSK) is now open for testing. The industry’s first user certification program for secure …
Featured news
Sponsored
Don't miss
- How insider threats can cause serious security breaches
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads