Saudi Hackers exposed personal information of 400 thousand Israelis

A Saudi Hacking  Group-XPA hackers have claimed  that they have hacked Israel’s famous and leading sports website  and leaked  personal information – including credit card numbers of over four hundred thousand Israelis. According to Army Radio reports, the Credit card companies said that ”the list is repetitive and contains details of hundreds, not thousands of […]

How to Secure Yourself from Hackers

Getting hacked is one of the phases of internet life that has affected millions of people around the globe. Even if you have the world’s best antivirus, spyware or firewall installed in your system, it still does not provide 100% security. You can add more to make your cyber life secure. Below are some details, […]

Find who is Invisible on Yahoo messenger

How to find who is invisible on yahoo messenger? Many people have asked me this question. Most of the times, some of our friends who pretend to offline is actually sitting in ”appear offline mode”, which is commonly known as the ‘Invisible’ mode. There can be many reasons for that, maybe they are sick of […]

Open Ban Websites Without Any Proxy Software

How to visit ban websites? this is a question that comes to mind whenever people realize that their favorite website is banned in the university, college, office or even at home sometimes. These websites may be banned for several reasons, sometimes to avoid people from wasting their time rather than working or studying or perhaps […]

Top 5 Internet Predictions for 2012

Top 5 Internet Predictions for 2012 2012 is coming with a lot of expectations; hence there have been lots of predictions about The internet in this year as well. Most people consider that these predictions are useless, but they can provide a certain idea about the future too. They might not be correct every time, […]

Could hackers break into your Wi‑Fi wireless router?

You just got a new wireless router for Christmas, but when you set it up it asks about wireless security. Do you want WEP, WPA, WPA2 or any of the other alphabet soup options they give? While it’s easiest to just pick the default setting, are you setting yourself up for trouble from aspiring hackers?

Stratfor hack – lessons learned

Recently we noted that unencrypted credit card storage was on the rise in 2011, and also highlighted the expense involved to the company in the event of a credit card breach. Now we see personal data – including unencrypted credit card information – being paraded out as a part of the recent Stratfor hack. Also,

Samsung DoubleTime smart phone: Review

Samsung continuing its great technological expertise has introduced the all new Samsung DoubleTime smartphone which is yet to be released. It was announced in October 2011 and is expected to be released by the end of December 2011. This smartphone supports GSM 850/900/1800/1900 2G Network and HSDPA 850/1900/2100 3G network. It is a touchscreen phone […]

Nokia Lumia 710 T-mobile: Coming soon

This is the all new Nokia Lumia 710 T-mobile. After Lumia 800 this is the next mobile phone from Nokia Lumia series. This smartphone supports GSM 850/900/1800/1900 2G Network and HSDPA 850/1900/2100 3G network. Nokia Lumia 710 T-mobile was introduced in December 2011 and is expected to be released in January 2012. The dimensions of […]

2012 Malware and Cybercrime Predictions: The video version

Exactly how people will abuse digital technology for their own ends is difficult to predict, but organizations must plan ahead to protect data and systems. That’s why we have been posting our “best guess” cybersecurity predictions on the Threat Blog this month. Today we present 9 of the most important predictions in the form of

Ransomware stoops to new lows – fake law enforcement

Ransomware, the practice of providing fake notifications that “you’re infected” and then selling a fake solution that removes the fake malware they just installed, has been a boon for scammers. Now, they’re taking it a step farther, throwing in a law enforcement scare. In this latest scam, an official-looking banner appears on infected machines, purporting

2012 Predictions: More mobile malware and localized attacks

I want share with you what ESET Latin America’s Research team thinks will be the main trends in malware and cybercrime in 2012. In our office it is usual to produce an analysis of emerging trends in a year-end report and so, in keeping with recent postings by my ESET colleagues, I present a summary

A dozen predictions for 2012

While I share the reluctance of my colleagues to predict the future, I think there are some trends that can be classified as “reasonably likely to occur” in 2012. I make no promises, but here’s what I think we will see, in no particular order of importance or certainty. We will see increased interest in

Spam campaign uses Blackhole exploit kit to install SpyEye

This article was written in collaboration with my colleague Jean-Ian Boutin. The Wigon botnet (also known as Cutwail) is being used in a massive spam campaign. A multitude of ruses are used to get the user to click on a link: fake LinkedIn or Facebook notifications, free Windows licenses, fake deliveries etc. The links are

How secure is TSA? Congress isn’t impressed

In a scathing and far-reaching US Congressional report released recently the Transportation Security Administration (TSA) was characterized in these unflattering terms: “Since its inception, TSA has lost its focus on transportation security. Instead, it has grown into an enormous, inflexible and distracted bureaucracy, more concerned with human resource management and consolidating power, and acting reactively

Motorola wins injunction against Apple iOS devices

In past, Apple has faced many lawful problems and now it has been kicked into a new one by Motorola as Motorola has won a certain preliminary injunction against some of the Apple products. It’s not the first time when Motorola has caused a problem for Apple. The injunction has practically affected devices with GPRS […]

Malware Drive‑by Infection Video: From fake FDIC message to infection

The FDIC is probably one of the most misunderstood quasi-governmental entities in America, which may account for its enduring popularity as part of malware and phishing scams. I’m not the most dedicated follower of banking news, but I did work for a bank once and I do try to keep up, yet I have never