Quantcast
Browsing all 2490 articles
Browse latest View live

Malware Alert: Your Friend Sent You a Photograph in WhatsApp

WhatsApp users are advised to be on the lookout for bogus emails that try to get them to open an attached file. The messages are part of a cybercriminal campaign whose goal is to distribute a piece of...

View Article


November Data Breaches: Learn from Others’ Mistakes

In this first of two parts, we look at what security professionals can learn from data breaches that occurred in November 2013.

View Article


Hacker gets 18 months for peddling computer access to U.S. national security lab

A Pennsylvania man who hacked into multiple corporate, university and government computer networks and tried to sell access to them — including access to supercomputers from a U.S. national security...

View Article

Malware Dons Disguise as Microsoft IIS Module

Researchers for Trustwave’s SpiderLabs have turned the flood lights on malware disguised as a module for Microsoft’s Internet Information Services (IIS) software. According to Trustwave, the malware is...

View Article

Subject Line Most Used in Phishing Emails: Invitation to Connect on LinkedIn

Researchers from Websense have analyzed phishing attacks to determine which are the countries that host the most phishing sites, and which are the most common subject lines used in such cybercriminal...

View Article


Application-layer Attacks Sparking New Investments in DDoS solutions, Reports...

“Strong growth of DDoS prevention appliances continues in 2013 as non-stop attacks plague a wide variety of industries, and large enterprises and service providers look to protect their users and data...

View Article

Bitcoin market price app, ‘Bitcoin Alarm,’ is carefully cloaked malware

If you get a spam message advertising an application called “Bitcoin Alarm,” the name may tell you all you need to know.

View Article

Bitcoin Mining Hoax Targets Macs, Wipes Out Your Data

Veteran security expert Graham Cluley is sounding the alarm regarding a hoax thats making the rounds on the web, tricking unwary Mac users that their computers are secretly designed to work as Bitcoin...

View Article


“Free Tesco Vouchers for Christmas” Phishing Scams Making the Rounds Again

Right around the same time last year, phishing emails that advertised Free Tesco Vouchers for Christmas started making the rounds. Now, the malicious notifications are landing in inboxes once again....

View Article


Google’s Decision to Display Images in Gmail Exposes Users to Read Tracking

On Thursday, Google announced that all the images received in Gmail emails would be displayed automatically. However, as with most functionality changes, this one also comes with some security and...

View Article

Hacker Claims to Have Breached AdNet Telecom, Customer Information Stolen

A hacker that uses the online moniker Valium claims to have breached the systems of Romanian telecommunications services provider AdNet Telecom, a company whose datacenters host the servers of several...

View Article

Hacker Tool Allows Cybercriminals to Automatically Register Tumblr Accounts

Researchers have come across an interesting commercially available tool that can be used by cybercriminals to automatically register Tumblr accounts. Dancho Danchev explains on Webroots blog that the...

View Article

Expert Finds Remote Code Execution Vulnerability on eBay – Video

German security engineer David Vieira-Kurz has identified a vulnerability on the Southeast Asia subdomain of eBay (sea.ebay.com). The security hole, caused by a type-cast issue in combination with...

View Article


Website of Myanmar’s Ministry of Mines Hacked

Hackers of a group called the Myanmar Muslim Cyber Force have breached and defaced the official website of Myanmars Ministry of Mines (mining.gov.mm). According to TechWorm, the hackers have defaced...

View Article

Hacker Sent to Prison for Trying to Change Medical College Admissions Test...

24-year-old Bosung Shim, of Rockville, Maryland, has been sentenced to 3 years in prison, 7 months of community confinement, and 3 years of supervised release for hacking into the computers of various...

View Article


Data Stolen from 104,000 Energy Employees Was More Sensitive than First Thought

Hackers that breached an Energy Department personnel database in July got away with more sensitive data than first disclosed by the government, including some banking information and password security...

View Article

NSA Agent Open to Cutting a Deal with Snowden

WASHINGTON – A National Security Agency official said in an interview released Friday that he would be open to cutting an amnesty deal with intelligence leaker Edward Snowden if he agreed to stop...

View Article


Issa: HHS pressuring contractors on subpoenas

In an escalating war over the House’s investigation into Obamacare’s website failures, Rep. Darrell Issa accused the Department of Health and Human Services of illegally pressuring contractors not to...

View Article

EU Bank Watchdog Warns Over Bitcoin

LONDON – The European Union’s banking watchdog on Friday issued a warning over virtual currency trading amid huge swings in the value of Bitcoin, a lack of regulation and money laundering risks. “The...

View Article

How Hackers Snooped on Government Officials at the 2011 G20 Summit Meeting

According to this story , dozens of computers of diplomats from countries including the Czech Republic, Portugal, Bulgaria, Hungary and Latvia had their computers infected with a virus designed to...

View Article
Browsing all 2490 articles
Browse latest View live