I came across an interesting side effect of Google forcing Gmail to be a social networking site. A young lady in middle school replied to a Buzz about what you think about Buzz. Her response? “I am just getting the hang of Buzz right now too. I don't really go on blogging websites since my
Search results for: "game"
I recently learned a new acronym: SODDI (Some Other Dude Did It). What this refers to is the defense that criminals routinely use (plausible deniability) – and even more so when it comes to illicit activities on the Internet. On Sunday, November 8th 2009 the Associated Press published an article regarding an individual that was
Did the spambots guess the answers to my questions? I think not. I tried the following two questions: 7/0= Got Milk In both cases the answer I specified as correct was “quue792mcow9up4esbbrkjldjb,dzrrkjrenjl407niuvdopinejnvf DHOIVNN;LN;ND” I’m pretty certain that the spambots did not have time to crack the question, so now it is time to find out
Blog spambots are programs that automatically post comments to blogs. They are basically stupid programs written by people whose own mothers would rather not acknowledge their existence. At any rate, they are a hassle for bloggers who allow comments. There are a variety of techniques to automatically delete the spam posts, but they have advantages
Is loyalty fraud on your radar? Here's why your hard-earned reward points and air miles may be easy pickings for cybercriminals.
We don’t need no stinkin’ wall power – CES shows off the promise of usable long-range wireless charging
ESET researchers look at malware that abuses vulnerabilities in kernel drivers and outline mitigation techniques against this type of exploitation
As we usher in the New Year, let’s take a look at some statistics that will help you stay up-to-date on recent cybersecurity trends
Hundreds of thousands of attempts to exploit the vulnerability are under way
The INTERPOL-led operation involved law enforcement from 20 countries and led to the seizure of millions of dollars in illicit gains
‘Tis the season to avoid getting played by scammers hijacking Twitter accounts and promoting fake offers for PlayStation 5 consoles and other red-hot products
With the holiday shopping bonanza right around the corner, here's how to make sure your online spending spree is safe
What's it like working as a malware researcher? – ProtonMail and the battle for email privacy – Man charged with hacking, trying to extort US sports leagues
Security and privacy get a leg up in Proton’s legal challenge against data retention and disclosure obligations
What are some of the key dangers faced by children online and how can you help protect them from the ghosts, ghouls and goblins creeping on the internet?
Putting a precision payload on top of more generic malware makes perfect sense for malware operators
From cybercriminal evergreens like phishing to the verification badge scam, we look at the most common tactics fraudsters use to trick their victims
Smartphones are kids’ trusty companions both in- and outside the classroom, and as they return to their desks, we’ve prepared some handy tips on how to keep their devices secure.
Meet SparklingGoblin, a member of the Winnti family