Occasionally, cyber crooks compromise websites administered by governments and make them host phishing pages.
Researchers have spotted a new technique used by phishers which could trick even more users into believing they are entering their information in a legitimate web form.
In the latest quarter, Solutionary SERT performed a broad analysis of the threat landscape, including information on the Shellshock and Aftershock vulnerabilities present in Bash.
Phishing scams targeting Apple users saw a dramatic upswing in Q3 of this year.
The Anti-Phishing Working Group (APWG) announced the establishment of an open-access cybercrime reporting program to speed the collection and redistribution of cybercrime machine-event data to anti-virus vendors, security companies, investigators and responders.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.