Tags: bradRemove, nudeRemove

Microsoft cracks half of Android supply chain  
By Liam Tung | Oct 24, 2011 | Comment Now 
Agreements 'fair and reasonable'.
Twilight star's pictures become latest malware threat 
By Phil Muncaster | Aug 17, 2009 | Comment Now 
Users have been warned not to click on links purporting to take them to the images.
Sophos blocked from YouTube over malicious Erin Andrews video 
By Dan Raywood | Jul 24, 2009 | Comment Now 
Security vendor Sophos has been caught out by censorship after a guidance video was blocked for 'inappropriate content'.
Malicious nude reporter video spreads online 
By SC Australia Staff | Jul 21, 2009 | Comment Now 
A 'peephole' video of an ESPN TV sports reporter has been spoofed with a malicious version now available.
Brad Pitt, Kate Winslet and 'Frost Nixon' are among the most malicious searched terms as the Oscars approach 
By Dan Raywood | Feb 18, 2009 | Comment Now 
Searching for this year's Oscar nominees can lead to malicious sites, according to McAfee, with Brad Pitt, Kate Winslet and Frost Nixon the most dangerous.
Brad Pitt declared most dangerous man on the internet 
By Shaun Nichols | Sep 17, 2008 | Comment Now 
'Brad Pitt' has been found to be the most dangerous search name of the year.
Spammers tout 'nude' Angelina Jolie pix 
By Robert Jaques | Jul 18, 2008 | Comment Now 
A new wave of spam messages related to Angelina Jolie are spreading with the intention to trick users into downloading and installing malware.
Spammers use Angelina, Britney gossip as lures 
By Sue Marquette | Apr 7, 2008 | Comment Now 
Cybercriminals are playing off the interest in celebrity gossip by sending email that promises erotic pictures of stars such as Angelina Jolie and Britney Spears but are ...
'Brad Pitt' identified in ID theft 
By Matt Chapman | Jul 3, 2006 | Comment Now 
A thief in the United Arab Emirates made a poor choice when he decided to use a picture from the internet to create a fake ID.
Sign up to receive iTnews email bulletins
Latest Comments
Should law enforcement be able to buy and use exploits?

   |   View results
Only in special circumstances
Yes, but with more transparency