Your fitness is their business. Nothing personal
Today, users are readily spending their money on house arrest-style services similar to those used for tracking criminals. They call them fitness trackers.
123 articles
Today, users are readily spending their money on house arrest-style services similar to those used for tracking criminals. They call them fitness trackers.
The final month of summer wasn’t full of cybercriminal stories, but law enforcement groups around the world still found and punished some evildoers.
July is over and that means it’s time to look back and observe the latest results of the battle between cybercriminals and prosecutors.
If it is absolutely necessary that you check your email and the only way to do it is on a public computer, forward your email to a disposable email account like Mailinotor or Trashmail that has a short life and a timed expiration.
Facebook has little to do with cybersecurity – it’s not a vendor. But at a certain point it took the battle against botnets to the enemy territory.
DoS/DDoS attacks is another popular, but somewhat under explained, term in cybersecurity. Explaining it in detail would take a monograph, so we’ll just hit the high points.
Criminals invented Cryptolocker, spying malware and Zeus banking Trojan. We have new protection against them.
The first summer month brought us news about the eternal confrontation of law enforcements and cybercriminals. Let’s see who was busted in June.
June was a busy month with hacks and data breaches, privacy, cryptography, and mobile security news, and an update on OpenSSL Heartbleed.
On the trail of Cabir’s “jubilee”, a new story about Nokia’s Symbian surfaced, involving stolen code, blackmail, charity donation, and a bag with several million euros. One day it could become a script for a criminal drama, but for now it is a story about sensitive data mishandling.
Two months have passed since the Heartbleed disclosure. Now it is time for a round-up: What damage did it inflict and what can we expect?
There was a lot of interesting news about hackers and other cybercriminals, so let’s see who has been busted in May.
The criminals continue their bad business, and law enforcement agencies successfully chase them down. It happens every month, so here are the most interesting cases from April.
The criminals continue to do their bad business and law enforcement agencies successfully chase them down. That happens every month, so here are the most interesting cases from March. A
As always, we continue to closely monitor the progress of law enforcement agencies as they chase down cybercriminals. Here are some cases from the last month. 3 years for DDoS-attack
This article is in reaction to the news that a new worm targeted specific models of Linksys routers. The Moon worm ([1], [2]) is exploiting a flaw of those routers’
CMS WordPress is in the spotlight again. Researchers detected another aggressive kind of malware that spreads from compromised sites running that popular CMS. At the moment, more than 200 infected
The year has just begun, but law enforcement agencies around the world have already caught a number of major cybercriminals. As in the past, we continue to closely monitor the
Non-stop cat and mouse We all need a vacation or at least a weekend to catch our breath a little and get going again. Only the criminal world works non-stop.
Internet Explorer vulnerabilities In the second half of September Microsoft announced the discovery of a more serious vulnerability (CVE-2013-3893 ) and a zero day exploit for it. The vulnerability is