It appears North Korea is expanding their cyber warrior savvy in a plan that includes sending the best and brightest of young...
The MacDefender malware has morphed again, now taking the guise of "MacShield." As in the case of its oldest sibling MacDefender,...
Cyber Security pundits have been keenly watching the development of nascent state targeted attacks such as the Stuxnet worm with interest for...
Android Smartphones are under attack again by rogue applications that once installed are reading information from the phone and sending it back...
A while back a malicious program called DroidDream was found on the Google Marketplace. The thing about DroidDream is that it exploited...
We like to give you plenty of warning when we suspect that something unpleasant is coming down the pike, even if it’s...
Over the past couple of years rogue online pharmacies have been advertising their domains on search engines and promoting themselves through search...
In an unfortunate series of events related to the RSA SecurID technology, reports are coming in that Lockheed Martin's networks have been...
Update: It seems like the initial article is inaccurate and that Paul Rellis never made any such comments about a 14 year...
In the last few days, I have been asked by a journalist (or four) what MacDefender means for the future of Apple...
Security companies in general and, unfortunately, anti-malware companies in particular, are often accused of ‘hyping’ threats because of a perceived self-interest. However,...
The recent MacDefender Trojan has been receiving “rebranding” facelifts since it came out. It has now been deployed as MacProtector, MacDetector, MacSecurity,...
Introduction As the sun is setting and I breathe some of the night time air I am inspired to write about Facebook. ...
Recent additions to SCMagazine's Cybercrime Corner blog include: "Password strategies: Who goes there?" by David Harley, May 23, 2011 Password selection usually...
Yes, it is Sony again. This time it is their Canada web site and their Japan website. According to thehackernews.com, which I...
... I haven't recently posted any pointers to our content on SC Magazine's Cybercrime Corner, and now might be a good time...
It seems a little strange to have the words "Facebook" and "privacy" in the same sentence in one of my blogs, yet...
Greetings Dear Reader, We have published guidance material previously on passwords and passphrases, some are blogs and some are lengthier depending on...
In life one cannot reload a particular scene; however, in gaming one certainly can. This is an unfortunate time for Sony PlayStation...
There are reports coming out today about Google Android and how approximately 99.7% of its users are potentially open to compromise. This...
Chinese Hackers Backdoored MiMi Chat App to Target Windows, Linux, macOS Users
Researchers Uncover UEFI Secure Boot Bypass in 3 Microsoft Signed Boot Loaders
U.S. Government Offers $10 Million Reward for Information on Conti Ransomware Gang
Cisco Patches High-Severity Vulnerability Affecting ASA and Firepower Solutions
Researchers Warn of Ongoing Mass Exploitation of Zimbra RCE Vulnerability
Conti Cybercrime Cartel Using ‘BazarCall’ Phishing Attacks as Initial Attack Vector
Cisco Confirms It’s Been Hacked by Yanluowang Ransomware Gang
Hackers Behind Cuba Ransomware Attacks Using New RAT Malware
GitHub Dependabot Now Alerts Developers On Vulnerable GitHub Actions
Experts Uncover Details on Maui Ransomware Attack by North Korean Hackers
The Business of Hackers-for-Hire Threat Actors
Hackers Behind Twilio Breach Also Targeted Cloudflare Employees
Microsoft Issues Patches for 121 Flaws, Including Zero-Day Under Active Attack
New Orchard Botnet Uses Bitcoin Founder’s Account Info to Generate Malicious Domains
Meta Cracks Down on Cyber Espionage Operations in South Asia Abusing Facebook
New IoT RapperBot Malware Targeting Linux Servers via SSH Brute-Forcing Attack
Hackers Exploit Twitter Vulnerability to Exposes 5.4 Million Accounts
Iranian Hackers Likely Behind Disruptive Cyberattacks Against Albanian Government
Emergency Alert System Flaws Could Let Attackers Transmit Fake Messages
A Growing Number of Malware Attacks Leveraging Dark Utilities ‘C2-as-a-Service’