Spammers switch to compromised accounts, shift away from botnets
Spammers today favor compromised accounts for sending spam, gradually shifting distribution away from botnets, according to Commtouch. The changed tactic has emerged as spam …
Anonymous releases 90,000 military emails and passwords
Anonymous persists with its AntiSec campaign and the latest target to fall has been Booz Allen Hamilton, one of the biggest U.S. military contractors. According to the …
140,000 children could be identity fraud victims
For most people, the thought of their children being victims of identity fraud is even more chilling than being a victim themselves. While children are less at risk for …
Critical vulnerability in Sun Java
ACROS Security has discovered a vulnerability in Sun Java, which can be exploited by malicious people to compromise a user’s system, according to Secunia. The …
MS Security Center search results poisoned
You would think that the Microsoft Safety and Security Center is the one place where you would be safe from malicious links, and you would be wrong. According to GFI’s …
U.S. to consider a new, secure Internet
While Iran thinks about instituting a national Internet in order to minimize the “poisoning” of Iranian minds with Western ideas and culture, the U.S. is toying …
An examination of malware ecosystems
Malware delivery networks are typically hosted across multiple sites and are responsible for launching dynamic attacks on unsuspecting users. A new Blue Coat report examines …
U.S. government-funded labs targeted by cyber attacks
It’s safe to say that successful U.S. companies, government facilities and military contractors are by now to aware that they should always be on the lookout for cyber …
Can the Google .co.cc ban be effective?
Google has recently decided to block all pages hosted on the .co.cc domain from appearing in its search results, and the move has sparked discussions. The search giant has …
“Casey Anthony confession video” scam spreads
The verdict in the high-profile Casey Anthony case has ultimately disappointed a lot of people who believe that she did kill her two-year-old daughter, and scammers have …
Law enforcement winning the battle against cybercrime
June was a difficult time for cybercriminals as it saw some notable successes for various law enforcement agencies in the war on cybercrime, according to Kaspersky Lab’s …
New voice identification technology
Neurotechnology introduced VeriSpeak, a new voice identification technology, available in the VeriSpeak SDK and as a new voice identification. VeriSpeak combines voiceprint …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online