Showing results 1 to 20 of 48

June 26, 2009 by

Michael Jackson's death themed malware campaigns spreading

The sudden death of Michael Jackson quickly opened a window of opportunity for cybercriminals to capitalize on.With a malicious spam campaign, blackhat SEO search results poisoning which is serving scareware within the first 100 search results for Michael Jackson's death, and an opportunistic participant in Zango adware's network using typosquatting, malicious activity is prone to increase during the next couple of days.

May 13, 2009 by

Spammers harvesting emails from Twitter - in real time

Spammers are no strangers to the ever-growing Twitter. From commercial Twitter spamming tools, to re-tweeting trending topics for delivering their message, a new crafty search technique can provide spammers with fresh and valid emails harvested from Twitter's users in real-time.

April 20, 2009 by

Google's CAPTCHA experiment and the human factor

Any research is prone to irrelevance if it starts with the wrong research questions, takes the wrong perspective, or in this case, attempts to fight the wrong enemy - automated bots attempting to recognize CAPTCHAs.Researchers at Google recently released a paper detailing a new CAPTCHA system consisting of correct image rotation (Socially Adjusted CAPTCHAs) whose main purpose is to make it easier for humans, and much harder for bots to recognize them.

November 10, 2008 by

Koobface Facebook worm still spreading

Originally spreading since July, the Koobface worm remains active according to a recent security alert issued by Websense :"The email reveals that infected user accounts are being used to post messages to Facebook friends lists. The content was an enticing message with a link that used a Facebook open redirector.

July 2, 2008 by

Gmail, Yahoo and Hotmail's CAPTCHA broken by spammers

Breaking Gmail, Yahoo and Hotmail's CAPTCHAs, has been an urban legend for over two years now, with do-it-yourself CAPTCHA breaking services, and proprietary underground tools assisting spammers, phishers and malware authors into registering hundreds of thousands of bogus accounts for spamming and fraudulent purposes.

March 14, 2008

The industry reflects, looks ahead

Industry players look back at 2007, discuss recession fears and name some hot technologies they'll be looking out for in 2008.

December 13, 2007 by

Hackers to target iPhone in 2008

Its immense popularity may turn the iPhone into a painful experience for Apple, if predictions that the mobile device will be a major security target in 2008 are realised.


You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All

Most Popular