The news follows on from warnings by security firm Trend Micro that cybercriminals are flocking to the Android ecosystem. Google has lashed out at Microsoft researcher Terry Zink, claiming there is no evidence to support his warning that a new...
Other Factors to Examine While SOPA The Senate had an opportunity to have a national conversation about an important and urgent issue: protecting American workers and consumers from foreign criminals.
Such lottery scams are a common tactic cybercriminals use to harvest personal data on users and gain access to bank accounts. Yahoo has claimed victory in a $610 million lawsuit against a group of individuals it accused of operating a massive spam...
Andrew Brandt, director of threat research at Solera Networks Labs, told V3 that the attacks are part of a much larger trend in which cybercriminals target browser plug-ins and third-party components.
Movie and music piracy and online sales of fake brand merchandise get a lot of attention, but the recent success of online information gathering to catch offline criminals suggests police forces across the country could do well hiring search and...
Cybercriminals need banning, so please feed attempts to isellsl.ath.cx' Sometimes, the story goes to press before the real news breaks. That's what happened last week. A lot has happened since then. I'll try to catch everyone up and make some...
As more people turn to the Internet to communicate and share with others on popular networking sites like Facebook and Twitter, cybercriminals are taking note, delivering new ploys through these channels -- and it's becoming increasingly...
The values at the core of networking sites -- openess, connecting, and sharing with others -- unfortunately are the very aspects which allow cybercriminals to use these sites as a vector for for various kinds of bad online behavior.
And here's why: ahead of and throughout the games, cybercriminals will be setting stealthy online traps aimed at leveraging public interest surrounding those searching for World Cup footage, news, and event information.
Advanced persistent threats require highly equipped and experienced individuals who -- in contrast to lower-level cybercriminals who spread their nets wide to catch as many unwitting suspects as possible -- select a small amount of high yield...