Microsoft Patch Tuesday – June 2014
This month the vendor is releasing seven bulletins covering a total of 66 vulnerabilities. Fifty-five of this month's issues are rated Critical.Read more...
View ArticleThailand's Coup d’État Used in Targeted Attack
Numerous Southeast Asian government officials at risk in malicious spam campaign.Read more...
View ArticleSpammers Push Hard to Capitalize on Father’s Day
Gift coupon and replica spam is prevalent in the run-up to June 15.Read more...
View Article.club gTLD Used in Hit-and-Run Spam Attacks
Spammers have been abusing generic top-level domains, released by the Internet Corporation for Assigned Names and Numbers earlier this year, in hit-and-run spam attacks.Read more...
View ArticleHow iOS 8 Will Affect the Security of iPhones and iPads
Apple’s mobile OS has been enhanced, but is it more secure?Read more...
View ArticleZorenium Bot Not Half the Threat It Claims to Be
Symantec finds out if this infostealer bot is as sophisticated as its marketing suggests.Read more...
View ArticlePinterest and Tumblr Accounts Compromised to Spread Diet Pill Spam
Spam related to Garcinia Cambogia Extract diet pills also cross-posted to Twitter and avoids spam filters on social networks.Read more...
View ArticleNico Nico Users Redirected to Fake Flash Player
Some of the video site's users were sent to a Web page that delivers other software.Read more...
View ArticleE-card Spam Claims to Help Users Get Rich Quick
The scam uses websites that pose as legitimate companies to trick people.Read more...
View ArticleWill Amazon’s Fire Phone Burn Users?
Amazon’s recently announced mobile device is due to be released in July and some of its features may present potential security concerns for users.Read more...
View ArticleImage Stock Spam Reemerges
Image stock spam, which can affect share prices and cause financial loss, has become more prominent in the last week.Read more...
View ArticleLooking at Android L – The Next Level
Google wants Android everywhere and on everything but what does this mean for user security?Read more...
View ArticleDragonfly: Western Energy Companies Under Sabotage Threat
Cyberespionage campaign stole information from targets and had the capability to launch sabotage operations.Read more...
View ArticleRig Exploit Kit Used in Recent Website Compromise
Attackers planted code in a popular Web portal to redirect users to an exploit kit.Read more...
View ArticleDailymotion Compromised to Send Users to Exploit Kit
Attackers made the popular video site redirect users to the Sweet Orange Exploit Kit.Read more...
View ArticleSpammers Ready Their Arsenal for US Independence Day
Spam emails take advantage of July 4 with fake offers.Read more...
View ArticleMicrosoft Patch Tuesday – July 2014
This month the vendor is releasing six bulletins covering a total of 29 vulnerabilities. Twenty-four of this month's issues are rated Critical.Read more...
View ArticleAll That Glitters Is No Longer Gold - Shylock Trojan Gang Hit by Takedown
The gang behind one of the world’s most advanced financial fraud Trojans has experienced a major setback after an international law enforcement operation seized a significant amount of its...
View ArticleTinder Spam: A Year Later, Spammers Still Flirting with Mobile Dating App
Spammers use bots on dating app to convince users to install games and sign up for adult dating and webcam sites.Read more...
View ArticleNeverquest Evolves Again and Seeks New Targets
Trojan.Snifula has continued to evolve and develop new features to steal more confidential online banking information.Read more...
View Article