A little over 18,000 Twitter users looking for a way to get their accounts verified have been duped by a single fake account promising to provide the service into visiting a phishing page.
Virtual Private Network (VPN) services can be used for circumventing Internet censorship and accessing blocked content, but researchers warn that you shouldn't believe the companies' claims that they offer privacy and anonymity.
Attackers are exploiting a vulnerability in eBay's Magento platform to steal users' billing information (including payment card info), warns Sucuri Security's Peter Gramantik.
While the Tor anonymity network conceals (relatively successfully) a user's location and Internet activity from anyone who might want to know about it, users should be aware of the fact that it does not offer end-to-end encryption, and any traffic that is not encrypted before it enters Tor can be seen and perused by those operating exit nodes.
There are several reasons one might want to use web proxy services, and depending on that reason, it might not be a very good idea to choose a free one randomly.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.