Worldwide e-mail scam campaign exploits Obama victory

A worldwide malicious e-mail campaign is using sensational "news" about U.S. President-elect Barack Obama as bait to steal the financial information of recipients.There are two different e-mails being distributed, according to Dan Hubbard,

Published on: November 7th, 2008 Michelle MacLeod

5 million reasons why crooks peddle bogus software online

Criminals can make as much as $5 million a year by planting nearly worthless security software on PCs, then badgering users with so many bogus malware warnings that they fork over their credit

Published on: November 4th, 2008 Gregg Keizer

Terrible Trojan steals 500,000 bank account, credit card logons

A sophisticated cybercrime group that has maintained an especially devious Trojan horse for nearly three years has stolen the log-ons to more than 300,000 online bank accounts and almost as many credit cards

Published on: November 3rd, 2008 Gregg Keizer

E-mail attachment malware soars 800 per cent in 3 months

The volume of malware attacks conducted via e-mail attachments increased about 800 per cent over the past three months as this low-grade hacking method was brought back from the grave, according to a

Published on: October 28th, 2008 Brian Jackson

Ouch! – Why SQL injections really sting and how to protect yourself

"SQL injection" – the phrase seems forbidding, and the reality it signifies is quite sinister.In fact this concept was mostly unknown just a few months ago, but now Web site developers around the

Published on: October 24th, 2008 Brian Jackson

E-ticket scam crash lands victims into a load of malware

In a reprise of a summer tactic, hackers are trying to trick people into infecting their PCs with malware by e-mailing them spurious airline-ticket invoices and boarding passes, a security company said today.The

Published on: October 22nd, 2008 Gregg Keizer

Bots could imperil your iPhone and blight your Blackberry

The ability of malware writers to consistently stay ahead of those seeking to stop them has been a constant factor in the security industry over the past several years.Looking to 2009, don't expect

Published on: October 21st, 2008 Jaikumar Vijayan

Hackers compromise thousands of Web sites

Several criminal gangs have acquired administrative log-in credentials for more than 200,000 Web sites -- including the one used by the U.S. Postal Service -- and have used the compromised domains to attack

Published on: October 6th, 2008 Gregg Keizer

Cybercrooks cast Brad Pitt, Beyonce and Justin T. in latest malware attacks

Googling celebrities on your workstation at the height of the recently concluded Toronto Film Festival could have been one of the most risky cyber-activity this month.Reverting to a tried and true tactic, spammers

Published on: September 22nd, 2008 Nestor Arellano

US gov’t focuses on cybersecurity backdoor defences

As part of a comprehensive cybersecurity push, the U.S. government will focus on improving its network defense capabilities and on revamping acquisition rules to protect against malicious code installed during the manufacturing process

Published on: September 16th, 2008 Grant Gross

Stretching security – the mobile device challenge faced by the enterprise

Trying to secure laptops, cell phones, PDAs, and other mobile devices today is "terrifying," says Christopher Paidhrin, IT security and HIPAA compliance officer at Southwest Washington Medical Center. "End-point security is scarily immature."

Published on: September 11th, 2008 Tom Kaneshige

Paris Hilton is McCain’s running mate

As if John McCain's selection of neophyte Alaskan Governor Sarah Palin to fill the second half of the Republican Party's presidential bill wasn't sensational enough, spammers proclaimed Paris Hilton as the unlikely running

Published on: September 8th, 2008 Brian Jackson

Eight e-mail scams that have suckered millions

Congratulations, you won the lottery in a country whose name you can't even pronounce! A wealthy oil executive in a far-off land wants to give you millions of dollars, right now! Sexy girls

Published on: August 25th, 2008 Nick Mediati and Anne B. McDonald

Hackers exploit Olympic fever to infiltrate PCs of unsuspecting fans

Cyber-criminals are using the Olympics to put malware on the podium, hijacking legitimate Olympic coverage and content so as to infect those involved with the Beijing Games and its fans, according to security

Published on: August 19th, 2008 Brian Jackson