Patching Windows HTTP vulnerability should be prioritized
Recently fixed CVE-2015-1635 vulnerability could allow remote code execution and facilitate DoS attacks.Read More
View ArticleThe Florentine Deception: 100% thriller, 100% plausible, 100% for charity
Symantec’s Carey Nachenberg has published an exciting new cybersecurity novel, the proceeds of which will benefit some worthy charities.Read More
View ArticleRansomware increasingly turning to the Far East
Cybercriminals behind ransomware are increasingly targeting opportunities in the Far East to capitalize on potential new victims.Read More
View ArticleAmateur attackers can steal data from thousands of files in an IaaS cloud
We demonstrate how a relatively unskilled attacker could gain access to data from more than 11,000 files in unsecured IaaS cloud environments.Read More
View ArticleOne-click fraudsters extend reach by learning Chinese
Latest scam campaign localizes content to target users in Hong Kong.Read More
View ArticleBreaking Bad-themed 'Los Pollos Hermanos' crypto ransomware found in the wild
Crypto ransomware affecting Australian computers uses Breaking Bad theme in ransom demand.Read More
View ArticleMicrosoft Patch Tuesday – May 2015
This month the vendor is releasing 13 bulletins covering a total of 46 vulnerabilities. Twenty-one of this month's issues are rated ’Critical’.Read More
View ArticleImpersonation phishing scam on Yahoo highlights importance of two-step...
Yahoo Mail accounts and address books used in family "emergency" impersonation scam.Read More
View ArticleVENOM vulnerability could expose virtual machines on unpatched host systems
The VENOM vulnerability (CVE-2015-3456) could expose VMs to unauthorized access and data theft. But is it really “bigger than Heartbleed?”Read More
View ArticleStolen funds from Starbucks customers another reminder to use unique passwords
Cybercriminals gain access to customer accounts, then transfer funds to other cards and gift cards.Read More
View ArticleRombertik is CarbonGrabber with a sting in the tail for cheapskates
Contrary to widely publicized opinion, Rombertik’s destructive payload is not aimed at security researchers.Read More
View ArticleCheck your sources! Trojanized open source SSH software used to steal...
Attackers have released a malicious version of PuTTY, an open source SSH tool, in order to gain unauthorized access to remote computers and steal information.Read More
View ArticleLogjam is latest security flaw to affect secure communication protocols
Similar to FREAK, Logjam is a newly discovered attack that is focused on subverting secure communications on the internet.Read More
View ArticleSMS spammers hide adult site URLs in YouTube videos
In a recent adult site scam, SMS spammers were observed hiding links in YouTube videos in order to bypass URL filters.Read More
View ArticleJapanese one-click fraudsters give old trick a second chance
New campaign uses an app as part of the scam and asks victims for up to US$2,400.Read More
View ArticleCrypto remorse? Author of new Locker crypto ransomware repents after earning...
Crypto ransomware author appears to regret encrypting victims’ computers and automatically decrypts their files.Read More
View ArticleJapanese one-click fraudsters target iOS users with malicious app delivered...
A Japanese one-click fraud campaign moved to iOS devices by delivering a malicious app through an adult video website and demanding a subscription fee.Read More
View ArticleMac vulnerability could provide persistent and stealthy access
Symantec confirms flaw allows attackers to install rootkit malware that could survive hard disk reformat.Read More
View ArticlePoweliks click-fraud malware goes fileless in attempt to prevent removal
Prolific click-fraud bot, Trojan.Poweliks, resides only in the Windows registry and uses several tricks to make it difficult to evict.Read More
View ArticleMicrosoft Patch Tuesday – June 2015
This month the vendor is releasing eight bulletins covering a total of 45 vulnerabilities. Twenty of this month's issues are rated ’Critical’.Read More
View Article