Trojan goes after Bitcoins
Bitcoin – the digital currency that has lately become a point of contention between those that consider it a perfect way of handling payments online and those who said …
LulzSec discloses 62,000+ random login credentials
LulzSec rampages on. They claimed they took out cia.gov for a couple of hours tonight, but its difficult to say whether they really did it or whether the site was made …
SpyEye Trojan attacks Air Berlin and AirPlus travelers
Trusteer have uncovered a SpyEye configuration that targets users of two leading European airline travel Web sites: Air Berlin, the second largest airline in Germany (after …
Free web hosting is a boon to phishers
Sometimes it seems that every legitimate service offered online can be misused by phishers, scammers and cyber criminals in general. Free mail services are abused to send out …
App that revealed most common iPhone passcodes booted from App Store
Following the publication of the statistics concerning the most common iPhone passcodes that application developer Daniel Amitay has shared on Tuesday, Apple’s …
Huge decline of Autorun-abusing malware
Infections with malware that abuses the Windows Autorun feature by automatically enabling AutoPlay have been declining since February, says Microsoft, and credits the security …
Microsoft investigates emerging Internet phone scam
An Internet scam that targets English-language markets and costs victims on average $875, according to Microsoft. The scam works by criminals posing as computer security …
Risk management under pressure
Has the financial services industry reached a comfort zone, placing it in jeopardy of another crisis? Are today’s risk management practices and reporting in tune with …
Protect yourself while surfing the mobile web
Lookout Mobile Security introduced Safe Browsing to protect against online threats when surfing the Web from a mobile device. Safe Browsing users can feel confident that they …
F-Secure Mobile Security 7 protects smartphones and tablets
The mobile world is changing fast. Smartphones and tablet computers are at the cutting edge of technological sophistication and defining what is cool to a new generation of …
Man convicted for using DDoS attacks in extortion scheme
A German man has been convicted to a 34-month prison sentence and has been ordered to pay some 350,000 Euros to the companies he blackmailed by threatening to take down their …
Citigroup data theft the result of a common vulnerability
If the information the NYT has received about the Citigroup breach is correct, and the intrusion was made possible by the exploitation of a vulnerability so frequent and …