Millions plundered from unsuspecting consumers in online credit card fraud

The U.S. Federal Trade Commission has disrupted a long-running online scam that allowed offshore fraudsters to steal millions of dollars from U.S. consumers -- often by taking just pennies at a time.The scam,

Published on: June 29th, 2010 Robert McMillan

Targeted malware attacks increase around G8 and G20 summits

Most well-publicized events have accompanying spam runs, like the death of a famous person or large sporting events. Most of you will have seen a news-related e-mail at some point that turned out

Published on: June 24th, 2010 ITBusiness Staff

Automated security software brings respite to three-person IT dept

Automated security software for both file server and client machines brought much needed relief to harried IT staff at a Quebec farm equipment distributor.Instead of constantly "putting out fires", the trio -- who

Published on: June 22nd, 2010 Nestor Arellano

iPad hacker booked on felony drug charges

One of the hackers in the group that snatched more than 100,000 iPad owner e-mail addresses from AT&T's servers was arrested Tuesday on felony drug charges after the FBI searched his Arkansas home.Andrew

Published on: June 18th, 2010 Gregg Keizer

9 surefire ways to protect your iPad and the data on it

The recent AT&T data leak underscores the need for iPad security precautions.The U.S. telco wanted to make logging into its 3G data plan dashboard a little easier on their iPad customers so they

Published on: June 16th, 2010 Mitch Wagner

‘We did nothing illegal’, say iPad email hackers

The hackers who harvested an estimated 114,000 Apple iPad 3Gowner e-mail addresses defended their actions Friday as "ethical" and said they did nothing illegal.The hacking group Goatse Security obtained the e-mail addresses using

Published on: June 15th, 2010 Gregg Keizer

Canada introduces anti-spam law as spam URLs become pervasive

The Government of Canada recently re-introduced anti-spam legislation, titled the Fighting Internet and Wireless Spam Act (FISA), in the House of Commons. The goal of the proposed legislation is to deter damaging and

Published on: June 9th, 2010 ITBusiness Staff

‘LikeJacking’ fraud entices Facebook users with risqu

Facebook users are falling for yet another clickjacking scam that fools them into "liking" a page. This one lures victims with the message "Paramore n-a-k-ed photo leaked," which claims to point to a

Published on: June 4th, 2010 Ellen Messmer

Tabnapping cons users into giving out their passwords

A Mozilla employee yesterday outlined a sly new attack tactic dubbed "tabnapping" that can dupe users into giving up passwords by secretly changing already-open browser tabs.All of the major browsers on Windowsand Mac

Published on: May 27th, 2010 Gregg Keizer

Rogue ‘sexiest video ever’ app pummels Facebook users’ PCs

A huge attack by a rogue Facebook application last weekend infected users' PCs with popup-spewing adware, a security researcher said Monday.On Saturday, AVG Technologies received more than 300,000 reports of the malicious Facebook

Published on: May 19th, 2010 Gregg Keizer

The Last Throes of Traditional Anti-Virus Software

It should come as no surprise to anyone that given the vast numbers of malicious software anti-virus companies are claiming to detect, the number of viruses out there is practically limitless. With the

Published on: May 11th, 2010 Claudiu Popa

Hacker offers up 1.5 million Facebook IDs for sale

A hacker named Kirllos has a rare deal for anyone who wants to spam, steal or scam on Facebook: an unprecedented number of user accounts offered at rock-bottom prices.Researchers at VeriSign's iDefense group

Published on: April 26th, 2010 Robert MacMillan

Compromised Gmail accounts used to flog Canadian pharmaceutical sites

Google is investigating a growing number of reports that hackers are breaking into legitimate Gmail accounts and then using them to send spam messages.The problem started about a week ago but seems to

Published on: April 22nd, 2010 Robert McMillan

Cyber attacks target sensitive data and specific individuals

Authorities in many countries are concerned that attacks on business and government resources will become the next battleground in cyber warfare. In the throne speech earlier this year, the Canadian government announced that

Published on: April 19th, 2010 ITBusiness Staff