Written By Shane Schick

IC3 Internet Crime Report Shows Social Media Complaints Have Quadrupled in Five Years

Social media-related scams including clickjacking, doxing and pharming are noticeably on the rise, based on the recent IC3 Internet Crime Report.

Logjam Flaw May Open Data to Cybercriminals by Fooling Web Browsers

Researchers say the Logjam flaw could fool Web browsers and servers into using weak encryption keys, allowing cybercriminals to intercept and decode data.

How a Fake Password Project Could Make Cybercriminals’ Lives Difficult

Researchers have created a fake password project that would allow companies a way to potentially limit the damage of leaked login information.

VENOM Flaw: The Truth About the Danger to Data Centers and Cloud Customers

Researchers recently exposed the VENOM flaw, which could let hackers sabotage virtual machines in cloud computing environments around the world.

Tinba Malware Watches Mouse Movements, Screen Activity to Avoid Sandbox Detection

Security researchers found that the Tinba malware is no longer relying on its small size as the only way to avoid detection from sandbox technology.

Malicious Macros in Spam Documents More Sophisticated Than Ever Before

A researcher recently found formats that save Web pages are being used to create malicious macros in spam to distribute malware to unsuspecting users.

Mumblehard Malware: Linux-Based Spam Generator Went Unnoticed for Five Years

Researchers from ESET say the Mumblehard malware has infected thousands of machines, sending spam and staying undetected for more than five years.

Nepal Earthquake Email Scams Could Lead Would-Be Donors to Malware

Authorities say Nepal earthquake email scams could be directing users to phishing sites that contain malware under the guise of giving to charity.

Startup Says AC Power Could Be the Secret to Spotting Medical Device Malware

A startup demoed technology at the recent RSA Conference that shows how AC power could detect medical device malware and fend off cybercriminals.

WordPress Vulnerability Lets Cybercriminals Insert JavaScript Code via Comments Field

A researcher says cybercriminals could exploit a WordPress vulnerability that uses JavaScript in blog comments to cause cross-site scripting attacks.