Fake Epsilon breach warning tricks users
Among the most annoying things you can find online are pages that pretend to offer or try to push a service in order to make money by simply referring the user to another …
35 million Google Profiles collected into private database
If you are one of those individuals that made their own Google Profile, chances are that you knew and agreed to the fact that the information you included in it will be …
The resurrection of the Mariposa botnet
When the news that the Spanish police arrested the three individuals suspected of running the Mariposa botnet was made public back in March 2010, it was generally thought that …
New Mac Defender variant doesn’t need your admin password
There is a new variant of the Mac Defender rogue AV out there, and this one doesn’t require users to enter the administrator password in order to install the program, …
Spam not the problem it once was
Email spam is still an everyday occurrence, but not the nuisance it once was, according to Avira. Nearly half of all end-users are satisfied with the anti-spam filters on …
How banks use Twitter to combat fraud
With phishing attacks hurting the credibility of email communications, forward thinking banks are turning to social media as the best channel to warn customers of scams and …
The evolution of traditional desktops into personal clouds
As users go virtual in all aspects of their life, the notion of doing all their work on a single traditional desktop in one physical location is rapidly evolving. …
Program defeats audio CAPTCHAs, researchers learn how to improve it
A group of researchers from Stanford University’s Security Laboratory has managed to build a computer program able to solve audio CAPTCHAs, reported the University on …
Comodo Brazil breached, sensitive data leaked
The recent spate of attacks against Sony’s various assets has probably made a lot of companies thank their lucky stars that they aren’t the ones who have been …
Apple acknowledges Mac Defender existence, gives removal instructions
It took a while for Apple to react properly to the onslaught of Mac Defender and similar fake AV aimed at Mac users, but they finally did it. Only days after the revelation of …
Sony online store hacked and user information published
It seems that hacking Sony’s assets has become a communal game in the hacker underground. Since the PSN hack, hardly a week went by without a hacker notifying the public …
Hotmail flaw allows attackers to exfiltrate emails
The analysis of a recent targeted attack against webmail users has led Trend Micro researchers to discover a vulnerability in Microsoft’s Hotmail webmail service that …