Please turn on your JavaScript for this page to function normally.
How to detect a phishing site, the Google way

Google analyzes millions of pages per day when searching for phishing behavior. This kind of activity is, of course, not done by people but by computers. The computers are …

Global response to Conficker threat: Model for future cyber threat response?

The problem with Conficker is that we still don’t know what it’s for. Yes, an estimated 7 million computers are infected worldwide, but they don’t show signs …

Beware fake eBay security alert

Red Condor issued a warning of a new blended email threat that appears to be a security alert from eBay. The email message with the subject line “eBay Procedural Warning …

Botnets drive the rise of ransomware

Ransomware is the dominating threat with nine of the detections in the malware top ten list resulting in either scareware or ransomware infesting the victim’s PC. …

OSSEC 2.4 released

The OSSEC team is pleased to announce the general availability of OSSEC version 2.4. There are lots of new features and bug fixes, but these are the main changes: Added daily …

Trojans are the most constant infectious vector

The generic mechanism that spreads using removable devices – Trojan.AutorunInf.Gen – is the top e-threat for March with 13.40 percent of the total amount of global …

Silent auto-patching for Flash plug-in within Chrome

The exhausting, continuous patching of software will, hopefully, some day come to an end. I seriously doubt it will be because of flawless code, but the possibility of having …

1,800 Office bugs discovered by Microsoft’s “fuzzing botnet”

Distributed Fuzzing Framework is what they call it at Microsoft, and it’s the realization of an idea that originated with one of the software designer engineers of its …

Stalker jailed for planting child porn on a computer

An elaborate scheme to get the husband of a co-worker he was obsessed with locked up in jail, backfired on Ilkka Karttunen, a 48-year from Essex. His plan was to get the …

Games on social networks increase spam and phishing by 50%

In order to reach high scores, social entertainment applications require users to gather a considerable number of friends and supporters to play the same game, leading to …

Wireshark 1.2.7 released

Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following bugs have been fixed: SNMPv3 Engine ID …

Evolving malware attack strategies exploit online user behavior

The popularity of social networking services and changes in online user behavior are driving broader attack strategies, including complex blended threats, faster malware …

Don't miss

Cybersecurity news