Spam Operation Exploited 750,000 Twitter Accounts to Promote a Diet Pill Online Security | March 26, 2015 | by George Smith For over a year, a single man has been conducting an extensive spamming operation which end goal was promoting a…
Instagram API’s New Bug Could Enable Attackers to Spread Malware Online Security | March 25, 2015 | by George Smith A new bug in the Instagram API has just been located. The Instagram API has been on the spot for…
How to Avoid Tax Fraud During Tax Filing Season 2015 Online Security | March 24, 2015 | by George Smith The IRS Tax season officially opened on January 20th, and although the deadline is April 15th, working citizens should be…
Anti-Censorship Activist Group GreatFire.org Under DDoS Attack Online Security | March 20, 2015 | by George Smith GreatFire.org, a group of activists dedicated to bringing transparency to the Great Firewall of China, have just experienced their first…
Facebook Rewards Bug Hunter $10,000, Sync Photo Vulnerability Fixed Online Security | March 20, 2015 | by cfoc Laxman Muthiyah is an independent security researcher who recently found a bug in Facebook mobile sync function. The system vulnerability…
VaultCrypt Takes Advantage of the Non-Proprietary Software GnuPG Online Security | March 19, 2015 | by George Smith The VaultCrypt is one of the ransomware threats that have begun to rely heavily on free codes to encrypt data…
DeepCode Tool Will Detect Vulnerabilities to Prevent Cyber Crime Online Security | March 18, 2015 | by cfoc The question of cyber-crime prevention seems to be a hot topic among security practitioners. As already reported, OpenDNS researchers are…
Trojan.Spy.FakeBank Targets Android Users Online Security | March 17, 2015 | by cfoc Banking Trojans are malicious programs that are used by cyber criminals to obtain private credentials. Their end goal is quite…
Security Report 2015: 70 Percent of Organizations Are at Risk of a Cyber Attack Online Security | March 16, 2015 | by cfoc In 2014, CyberEdge Group, an American premier research and marketing consulting company, released a one of a kind defense report.…
Google Apps for Work Leaked More than 280,000 Domains Online Security | March 13, 2015 | by cfoc Due to a software bug in Google’s system more than 282, 000 domains were leaked. The breach in the system…
Real-Time Bidding Gone Bad Thanks to Ransomware Threat Online Security | March 12, 2015 | by cfoc Over the last couple of years, real-time bidding (RTB) has become quite popular around the Internet. It is a form…
Reconnect Tool Exploits Facebook Login on Websites Online Security | March 11, 2015 | by cfoc Reconnect is a tool that gives attackers the chance to hijack accounts on sites relying on Facebook login. The tool…
CryptoLocker Ransomware Targets Australian Businesses Online Security | March 10, 2015 | by cfoc CryptoLocker is probably the most malicious ransomware that has been around since 2013. It targets all Windows versions through asymmetric…
FREAK Attacks Microsoft Windows Online Security | March 9, 2015 | by cfoc FREAK is a recently found vulnerability in the SSL and TLS cryptographic protocols that might put hundreds of secure connections…
Dridex Trojan Luring Users into Enabling Macros in XML Files Online Security | March 9, 2015 | by cfoc As malware researchers had revealed at the end of 2014, the Dridex Trojan, also known as Feodo, Bugat and Geodo,…