phishing

The business behind a hacked email account

Which is the commercial value of a hacked email account in the underground? How cybercriminals use a compromised email account?…

11 years ago

Facebook Zeus malware targeting bank accounts

Principal security firms detected a new variant of Facebook Zeus malware that is exploiting the popular social network to target…

11 years ago

Microsoft could intercept Skype conversation, is it true?

German researchers revealed that Microsoft is able to intercept Skype conversation for security reason. Which are risks to the users'…

11 years ago

Mobile Threat Report for Q1 2013, the monopoly of Android malware

F-Secure published the Mobile Threat Report for Q1 2013 that reveals Malware targeting Android devices is rapidly growing in both…

11 years ago

APWG Global Phishing Survey report revealed new scaring trends

APWG issued the new edition of its APWG Global Phishing Survey report that identifies trends and their significance by quantifying the…

11 years ago

In the mind of cybercriminals – The Boston Marathon attack

To fight the cybercrime we must start thinking like criminals, they are people motivated solely by money and the need…

11 years ago

DHS alerted energy companies on ongoing spear-phishing campaign

Cyber espionage is considerable as  one of the most aggressive and dangerous cyber threats, its silent operation could steal sensitive…

11 years ago

First APT attack on Android targeted Tibetan & Uyghur activists

Read about APT attacks has become customary, even easier to hear of attacks against political dissidents or minorities as Tibetan…

11 years ago

CNCERT – China is also a victim of cyber attacks

Recent cyber attacks against North and South Korea are inflaming the debate on the importance of cyber security, governments are…

11 years ago

Indian pentester discovers a flaw in Google Drive

As usual I was reading the news on The Hacker New security portal when a post attracted my attention, another…

11 years ago

This website uses cookies.