It looks as though Microsoft is quietly tracking down the cybercriminals behind the infamous Rustock spam botnet, following the software giant’s court-approved seizure of several command-and-control servers.
Scammers use current events to steal money, personal information
Scammers are increasingly using current events, such as the Japan earthquake and tsunami, to trick people into donating money to bogus organizations or clicking on bogus news reports that contain embedded malware.
Amex leapfrogs Visa in secure micropayments market
American Express has neatly leapfrogged Visa’s P2P micropayment gameplan by announcing plans to launch its own service, months ahead of Visa, and offering the service on the web, as well as on Apple iPhone, Android and BlackBerry handsets.
iPhone falls 1,000 feet – tracked down by owner using GPS
How robust is an Apple iPhone? Very, judging from a report from US Air Force combat controller Ron Walker, whose iPhone fell out of his jumpsuit pocket – from 1,000 feet in the air.
Maine state park visitors may have had credit card data exposed
Around 970 visitors to Maine state parks, between March 21 and Dec. 22, 2010, may have had their credit card numbers exposed as the result of a malware attack against the online state-park pass system, the Maine Conservation Department announced.
Census 2011 data privacy questioned
Last night was Census 2011 night and all UK householders are now requested by the Office of National Statistics (ONS) to fill in the required forms under threat of a possible fine. But questions have been raised about the security of the census data, w…
Trusteer CEO warns over highly targeted malware attacks
In-browser web security specialist Trusteer has warned internet users about the apparently new problem of targeted malware attacks, where criminals use business social networking sites to identify their victim, specifically infecting the target’s compu…
DHS identifies key building blocks for more secure, resilient networks
Automation, interoperability, and authentication are the three security building blocks to create more secure and resilient networks, according to a recent Department of Homeland Security (DHS) white paper.
Apple rejects cellphone radiation monitoring app
Despite the software already being developed for the Android and BlackBerry app stores, Apple has apparently rejected a radiation monitoring application for the iPhone.
Comodo certificate compromise has Iranian fingerprints
This week’s widely reported compromise of a batch of Comodo digital certificates, which resulted in hackers being able to fake trusted sites from the likes of Google and Yahoo, has been blamed on Iranian hackers with possible government assistance.