Are You A Secret Cybercriminal?
On the night of June 5, 2013 a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals
454 articles
On the night of June 5, 2013 a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals
If you haven’t heard by now, three days before Jay Z released his most recent album “Magna Carta… Holy Grail” in July, Samsung Galaxy device owners could download it via
There are no borders for cybercriminals. To be more precise, they strategically use borders to steal in one country, cash out in another and spend stolen money in a third
In addition to the above examples, there were two other large scale and highly scandalous invasions in July and August of last year. The victims were users of the popular
According to Kaspersky Labs research, 34 percent of worldwide Internet users were attacked by malicious programs in 2012. As always, the most popular entries for attackers were widely used programs
There is an entire market of plugins out there designed to keep you safe while surfing the web on your browser of choice. Each one has lots of options; for
Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself and its activity in
The Internet has revolutionized the way we book our holidays. Unfortunately it is also enabling fraudsters to prey upon people’s desires to have a perfect vacation, so stay vigilant and
If Achilles’s heel was his vulnerability in the Iliad, then Paris’s poison tipped arrow was the exploit. Quite literally, an exploit is the device or – more often than not
Not long ago, Twitter was a novelty social media site that average users thought was silly. Now the microblogging tool is a vital news source and publishing platform, letting anyone
Twitter has recently caught up with competitors like Facebook and Google by improving user protection with two-factor authentication. This will help us all forget about those much talked about account
We are continuously watching how law enforcement agencies around the world fight cybercrime. With help from the IT industry and experience gained over the years, these agencies have been able
Over the last 9 years Facebook has grown from a small social networking site originally intended for college students into a worldwide platform that is now used not only by
Given the deftness of malicious hackers, the bar-lowering impact of easily accessible markets for automated cybercriminal kits, and the increasing number of online services and people connected to the Internet,
The general public should be well aware at this point that identity theft is increasingly common and has calamitous effects that are far more serious than the half-baked Melissa McCarthy
Botnets are large networks of PCs infected with a specific kind of malware. Learn more on how to protect your devices from this type of malware.
Smartphones and tablets are now a vital tool for any modern businessman. Many of us cannot imagine life without a mobile assistant which stores our contacts, messages, photos and documents.
A group of Internet activists and privacy advocates penned an open letter to Microsoft earlier this year urging the company to shed light on just how confidential the conversations are
Everyone loves the hands-free convenience that Bluetooth enables — some people love it a little too much and insist on wearing their Bluetooth ear pieces every waking hour like they’re
If a website is compromised by a careful, talented, and well-funded attacker, then the scary reality is that no one will probably ever know that the site had been hacked
The threats facing mobile devices are among the fastest growing and most serious dangers to the digital world. We gathered your questions on the subject and passed them on to