The Cyber Intelligence Sharing and Protection Act (CISPA) passes the U.S. House despite privacy concerns and the threat of presidential veto.
Here’s a brazen fake antivirus program that falsely declares you are infected, then locks your screen and asks you call a toll free number for Support, which then asks you to pay to remove the fake infection.
A quarter of PCs around the world have no antimalware software, according to Microsoft’s latest Security Intelligence Report.
Up to 2.4 million credit cards may have been compromised after St. Louis grocery chain Schnucks was targeted with malware, the chain revealed this week.
China and the U.S. have agreed to work together on cyber security, with the two countries setting up a working group to deal with the issue, U.S Secretary of State John Kerry said on Saturday in Beijing.
An Oregon farm products company is suing its own bank to recover losses after a phishing attack saw $223,500 transferred to accounts in the Ukraine over a period of three days in 2010.
Technology companies including Cisco and IBM are backing an Open Group programme to protect computer hardware from threats such as spyware added to components in the supply chain.
60,000 Android apps were removed from Google’s Play app store this February. Categories such as personalization (ringtone apps) were targeted heavily, with 12,277 deletions.
A new Global Center for Cyber Security at the University of Oxford will coordinate international work on cyber threats and cyber security. The Center will receive £500,000 ($766,000) in UK government funding every year.
Utility companies have been warned not to share information such as email addresses on company websites, after a spear-phishing attack on an American electricity company.
Use of pirated and counterfeit Windows software has tripled since 2006, according to analysts IDC – creating a fertile breeding ground for malware. For the report, entitled ‘The Dangerous World of Pirated and Counterfeit Software’, IDC analysts conducted 533 tests on counterfeit software from P2P and web sources.
The new trend for “always online” games such as SimCity and Blizzard’s Diablo 3 may be putting gamers at risk, experts warn. The games, which require an internet connection even for single-player gaming, are designed to protect game companies from piracy.
Malicious spam may still be spreading across Yahoo! Mail accounts. We show you how to turn on the added verification process that Yahoo! offers.
Major world events always bring with them an upsurge in related spam and the election and inauguration of a new Pope is no exception.
Protection and remediation tips for Mac OS X users targeted by a Trojan adware plugin called Yontoo hidden behind movie trailer and other media playing links, generating money for criminals exploiting online ad schemes.
Technical analysis of Power Loader, a special bot builder for making downloaders for other malware families and yet another example of specialization and modularity in malware production.
A deep dive into Win32/Theola, one of the most malicious components of the notorious bootkit family, Win32/Mebroot.FX. Theola uses malicious Chrome browser plugins to steal money.
Malware infecting 25,000 computers, mostly in the United States, pumping out 80 million spam messages per hour? ESET researchers sinkhole to investigate Win32/TrojanDownloader.Zortob.B