Can’t find a way to support a hacktivist with your l337 sK1LLz? Turns out they take tips, bitcoin tips. We mused awhile...
Is that possible? Well, a researcher with Identity Finder, Aaron Titus, believes so, since he says he managed to use internet searches...
... people have been asking me about Google's interesting paper on Trends in Circumventing Web-Malware Detection...
Nearly three years old, the Conficker worm continues to pose a threat to PCs. Aryeh Goretsky wants to know why this is,...
Aryeh Goretsky interviewed, as his paper on Possibly Unwanted Applications is published.
I have an Android in my pocket as I type, with all kinds of cool apps ranging from GPS navigation to acoustic...
On the heels of the recent activity with Stuxnet, the industrial process control computer worm that targeted Iranian nuclear centrifuges, a Blackhat...
Among the many different trojans that spread on Facebook, something popped up recently that caught our particular attention. The threat, detected...
What we're lacking here is a clear differentiation between types of "hacktivist" or, indeed, "activist": much of the commentary that's around at...
Forensic software developer PassWare announced a new version of its eponymous software forensics kit on Tuesday. Already several news sources are writing...
Well, really there are far more, but the latest study from Imperva of 10 million attacks against 30 large organizations from January...
The most common malware technique for avoiding detection is to create loads of “fresh” variants. Actually, the component that changes so frequently...
Or so the latest report from DEBKAfile states, claiming the Stuxnet worm broke numerous Iranian centrifuges by forcing them to overspeed, causing...
With the proliferation of the data we hold on our mobile devices, it’s no wonder Neil Daswani, CTO of Dasient, says around...
...one Yasuhiro Kawaguchi was arrested yesterday on suspicion of "saving a virus on his computer," though the story suggests distribution of malware...
2 days ago, the FBI announced a series of raids resulting in arrests of alleged members of the hacking group ‘Anonymous’. Hoping...
In their presentation “Cybercrime in Russia: Trends and issues” at CARO2011 -- one of the best presentations of the workshop, in my...
Sitting in an airport you rarely frequent, you grab your laptop and snap out a couple e-mails to send, and look, there’s...
The mobile devices of late have more compute power than the full desktop PC of yesteryear, and they fit it your pocket,...
With Facebook's launch of video chat powered by Skype underway and enabling a new level of communication on its platform, we take...
Google, in an effort to get more squarely into the center of the social networking scene, is implementing a system where private...