miniFlame: Flame Module Turns Out to Be Standalone Malware

miniFlame: Flame Module Turns Out to Be Standalone Malware

This further strengthens the theory that Gauss and Flame are connected

Santander Bank UK Stores Credit Card Numbers in Cookies, Researcher Finds

Santander Bank UK Stores Credit Card Numbers in Cookies, Researcher Finds

Other sensitive information is also exposed in the same manner

Criminals Don’t Hide Their Online Tracks As Well As Cybercriminals, Experts Say

Criminals Don’t Hide Their Online Tracks As Well As Cybercriminals, Experts Say

Kaspersky researcher uses cleverly designed script to track down a kidnapper

“I Will Use a Bomb to Destroy an Airplane,” Computer Virus Says on Victim’s Behalf

“I Will Use a Bomb to Destroy an Airplane,” Computer Virus Says on Victim’s Behalf

Three individuals from Japan have been arrested because of this piece of malware

Facebook Develops “Extensive System” to Fix Phone Number Leakage Issue

Facebook Develops “Extensive System” to Fix Phone Number Leakage Issue

The accounts of users who attempt to exploit the search functionality are suspended

Skype-Spreading Malware Might Have Infected 1 Million Users

Skype-Spreading Malware Might Have Infected 1 Million Users

The threat is capable of stealing passwords and use compromised PCs to launch DDOS attacks

Muslim Hackers Responsible for Attacking US Banks Not Identified or Located

Muslim Hackers Responsible for Attacking US Banks Not Identified or Located

Gartner's Avivah Litan shares some insight on the recent attacks

Expert Reveals the Things That Allow Hackers to “Pwn” Websites [Video]

Expert Reveals the Things That Allow Hackers to “Pwn” Websites [Video]

Troy Hunt's complete presentation at the Developer Developer Developer! conference

Sality Botnet Scans Entire Internet in Search for Vulnerable VoIP Servers [Video]

Sality Botnet Scans Entire Internet in Search for Vulnerable VoIP Servers [Video]

A technique called "reverse-byte order scanning" was deployed

Experts Analyze Backdoor.Proxybox Malware, Attempt to Identify Mastermind

Experts Analyze Backdoor.Proxybox Malware, Attempt to Identify Mastermind

The botnet's owner appears to be an Ukrainian national living in Russia

Researchers Use McAfee and Trust Guard Trustmarks to Find Vulnerable Sites [Video]

Researchers Use McAfee and Trust Guard Trustmarks to Find Vulnerable Sites [Video]

A simple tool can show attackers what websites they should target

Human Rights Group Introduces “Civil Rights CAPTCHA”

Human Rights Group Introduces “Civil Rights CAPTCHA”

How do you feel about the fact that in Kosovo detained people are tortured?

Cybercriminals Turn To Universal Man in the Browser Attacks to Steal Valuable Data [Video]

Cybercriminals Turn To Universal Man in the Browser Attacks to Steal Valuable Data [Video]

Fraudsters can target the information entered by a victim on all websites

Brute Force Attack Can Break PINs of Cisco CallManager Accounts, Researcher Finds

Brute Force Attack Can Break PINs of Cisco CallManager Accounts, Researcher Finds

The attack relies on a “sid” token obtained in response to an HTTP GET request

Cybercriminals Hijack 4.5 Million ADLS Modems in Brazil to Serve Malware

Cybercriminals Hijack 4.5 Million ADLS Modems in Brazil to Serve Malware

Researcher Fabio Assolini presents the details of a major cybercriminal operation

Mobile “Visual Malware” Able to Reconstruct 3D Model of Victim’s Environment

Mobile “Visual Malware” Able to Reconstruct 3D Model of Victim’s Environment

The "malicious" application can be successfully used to commit virtual theft

Best Themes Songs for Hacking, DDOS Attacks and Malware Payloads

Best Themes Songs for Hacking, DDOS Attacks and Malware Payloads

“Seek and Destroy” by Metallica is appropriate when destroying data, because Metallica is appropriate for everything

 
Want more? Browse: