The One-Click Billing fraud, a scheme known to target PC users in Japan, now appears to target smartphone users as well. The scheme, as its name suggests, tricks a victim into registering and paying for a certain service after being falsely led into a specific website. Instances of successful attacks have been increasing in [...]
Hurricane Irene surely turned New York City to “city that never sleeps” as it brought flood waters, knocked out power to more than 4 million people and was even responsible for at least 15 deaths in six states. What’s worse is that cybercriminals are taking advantage of the incident by spamming a fake video [...]
Since July 2010, Microsoft’s vulnerability research team has identified and responsibly disclosed 109 different software vulnerabilities affecting a total of 38 vendors.
A Special Offer From Our Sponsor Visualize the Future of the Network Do you know what a zettabyte is? Does the cloud confuse you? Why will your company need [...]
The operators of malicious networks are continuously monetizing their activities by propagating rogue security software that use scare tactics to trick unsuspecting users into installing and purchasing fake antivirus software, aka FAKEAV. Although there has been a decline in the FAKEAV volume as a result of the increasing pressure on payment processors that handle credit card [...]
When talking about social media threats, the focus tends to be on the notorious KOOBFACE malware, which has recently turned a “new leaf” and now propagates via peer-to-peer (P2P) file sharing. However, KOOBFACE is not the only danger that hounds social media. These social networking sites also have features that could become vectors to threats. [...]