For years, security vendors have warned users to be careful about unsolicited emails. Clicking on embedded links in these emails, they say, could be dangerous, as could opening attachments that come with them. That includes emails purporting to be from couriers such as DHL and UPS, which could in fa...
As the 2010 Winter Olympics kick off, the games are on everyone's radar, including the cybercriminals who are looking to capitalize on this world event. Spam campaigns featuring breaking news stories filter through to in-boxes faster than ever before, as automated scripts scrape headlines and the te...
Phishing is a tactic known to malicious hackers ever since the first one crawled out of a swamp and onto dry land. It's another variation on social engineering. The phisher's goal is to get people to open themselves up to technical vulnerabilities through nontechnical means. However, even though mos...
The notorious Norwegian hacker, Jon Lech Johansen -- better known as "DVD Jon" for releasing code that broke DVD copy protection in the late 1990s -- has drawn first blood with the iPhone. Johansen has posted a workaround on the Internet that allows iPhone owners to use their devices in a limited fa...
For the second time this year, hackers have victimized the University of Missouri. The names and Social Security numbers of 22,396 current or former students who were employed by UM during 2004 may have been compromised, according to university officials. The hacker or hackers reportedly gained acce...
Hackers on Tuesday launched a denial-of-service attack against at least three of the 13 root servers that maintain the Internet's domain name system. The attacks, which lasted for 12 hours, reportedly targeted the server that maintains the dot-org suffix, and the servers at the Department of Defense...
Professional cyberthieves and organized crime rings are looking to cash in on stolen identities and are releasing an increasing amount of malware in the process. McAfee predicts the following disturbing trends: a rise in the number of password-stealing Web sites that use fake sign-in pages for popul...
WebSense on Monday identified a Trojan horse that targets Skype IM users in what marks the latest in a series of instant messaging attacks this year. The security researcher first reported the attack as a self-propagating worm called "sp.exe." After a full day of investigation in cooperation with Sk...
Another zero-day vulnerability in Microsoft Word has been identified, MessageLabs reported on Tuesday. The new, unannounced vulnerability was exploited in an e-mail attack aimed at a few large corporations, Alex Shipp, an engineer with MessageLabs, told TechNewsWorld. The attack -- consisting of thr...
Research from two separate messaging consultancies indicates that e-mail and instant messaging attacks continued apace in the month of March, but the number of viruses detected surprisingly declined. San Carlos, Calif.-based messaging management firm Postini processed more than 23 billion messages a...
Skype's popularity rose to a whole new level when eBay purchased the VoIP provider last month. Now, the free Internet telephony service has become the victim of a spoof campaign designed to infect users with an IRCbot Trojan. Messaging security and management services provider MessageLabs yesterday ...
Viruses and spam -- and the techniques used to create, disguise and distribute both -- are converging into a single threat in which the two computer disruptions depend on one another in a sort of symbiotic manner, according to security experts. Security firm MessageLabs highlighted the convergence i...
Viruses delivered by e-mail, phishing attacks and spam are becoming as much a part of using computers as accidents, tolls and bumper-to-bumper delays on the freeway are in commuting to work each day. Both situations cause frustration, steal productivity and cost money. Phishing scams trick e-mail re...
It appears writing viruses is becoming as easy as ABC, particularly given the deluge of worm variants in the Bagle, Netsky and Phatbot families. But the collections of worms are causing some confusion among virus fighters as well as increased danger for users. The latest example is the Bagle.Z varia...