Category Archives: security

The History of Computer Viruses [INFOGRAPHIC]

Computer viruses have been around for a long, long time — pretty much as long as personal computing and mainstream software development &#… Continue reading

Posted in infographic, security, virus, Web Development | Tagged , , , , , , , , , | Comments Off on The History of Computer Viruses [INFOGRAPHIC]

Google Pulls 21 Apps In Android Malware Scare

Google has just pulled 21 popular free apps from the Android Market. According to the company, the apps are malware aimed at getting root access… Continue reading

Posted in android, malware, Mobile 2.0, Mobile Apps, security | Tagged , , , , , , , , , | Comments Off on Google Pulls 21 Apps In Android Malware Scare

How Much Does Identity Theft Cost? [INFOGRAPHIC]

Online fraud and related crime is on the rise, affecting more lives and costing individuals and businesses more money year after year. Not to long ago, we showed you what identity theft and online fraud costs from the criminals’ point of view. For example, a cybercriminal could set up a fake online store, designed to […] Continue reading

Posted in fraud, identity theft, online fraud, security, trending | Tagged , , , , , , , , , | Comments Off on How Much Does Identity Theft Cost? [INFOGRAPHIC]

Lush’s UK Website Hacked, Credit Card Numbers Used

Hackers are cashing out after stealing credit card numbers from Lush’s UK website, which was shut down on Friday and replaced with a message that warns customers that their account information may have been compromised. According to the message, anyone who made online purchases on the handmade cosmetic company’s UK site between October 4th and […] Continue reading

Posted in credit-card, e-commerce, hack, Lush, security, tech | Tagged , , , , , , , , , | Comments Off on Lush’s UK Website Hacked, Credit Card Numbers Used

The State of Cybercrime [STATS]

How much does it cost to buy a stolen credit card number on the black market? What about renting a botnet or setting up a fake online store desi… Continue reading

Posted in black hat, cyber crime, cyber criminals, cybercrime, data security, security, user data | Tagged , , , , , , , , , | Comments Off on The State of Cybercrime [STATS]