THIS WEBSITE IS NO LONGER UPDATED but THE INTERNET NEVER FORGETS

Facebook WARNING: Avoid the “Find who is stalking you with Profile Peekers” SCAM

FAKE SCAM PROFILE PEEKERS FACEBOOK APPFAKE SCAM PROFILE PEEKERS FACEBOOK APP

Watch out! A successful fake Facebook Application scam is catching quite a lot of people by preying on our  instincts of curiosity and paranoia. Profile Peekers claims to show you who is stalking you and how many times your Facebook Profile has been viewed! Now, I would be interested in that too just like you… Continue Reading …

Stuxnet Computer Worm Targets Iranian Nuclear Plant

Percentage Of Stuxnet Hits By CountryPercentage Of Stuxnet Hits By Country

The security research world is oohing and ahhing lately at what may turn out to be the most sophisticated malware attack ever: Stuxnet. Stuxnet appears to be more than just another malware attack, and more than just another targeted attack. Many believe that it is a government-sponsored attack against Iran’s nuclear facilities. Top cybersecurity experts… Continue Reading …

Hackers Roll Call

The following list of Security Researchers are “White Hat” ethical hackers whose discoveries and inventions shake things up as they try to stay one step ahead of their underground “Black Hat” brothers… It’s not unusual to hear someone say “Rsnake found out…” and Hansen’s manic inventiveness includes the “Slowloris” low-bandwidth denial-of-service tool, which ended up… Continue Reading …

iPad E-mail malware attack

Scammers are distributing emails designed to trick iPad owners into downloading software that they think is an iTunes update, but which turns out to be malware that opens a back door on the computer, researchers warned on Monday.

Facebook Applications Spreading Adware

Facebook Applications Spreading AdwareFacebook Applications Spreading Adware

  A new scheme allows cyber-criminals to monetize on unwary users by leading them into installing adware applications. Rather than using hidden vulnerabilities in the social networking platform, this novel approach relies on social engineering in order to trick users into interacting with the attacker.