Qihoo 360: Just the Tip of the Whitelisted Malware Iceberg
The Check Point Mobile Threat Prevention team has long stressed how dangerous it can be to get apps from places other than the Apple App Store and Google Play EvenRead More →
The Check Point Mobile Threat Prevention team has long stressed how dangerous it can be to get apps from places other than the Apple App Store and Google Play EvenRead More →
The Open Sourced Vulnerability Database (OSVDB) shut down permanently in response to the lack of assistance from the industry. The Open Sourced Vulnerability Database (OSVDB) shut down permanently, the news wasRead More →
Crypto-ransomware has turned every network intrusion into a potential payday. There’s something inherently world-changing about the latest round of crypto-ransomware that has been hitting a wide range of organizations over theRead More →
A new ransomware called CryptoHost was discovered by security researcher Jack that states that it encrypts your data and then demands a ransom of .33 bitcoins or approximately 140 USD to get your files back.Read More →
Attackers can exploit the flaws in the ARRIS SURFboard cable modems to remotely knock out the device, more than 135 million device open to attacks. The security expert David LongeneckerRead More →
Proofpoint researchers discovered that the Magnitude exploit kit (EK) [1] was successfully exploiting Adobe Flash version 20.0.0.306. Because the Magnitude EK in question did not direct any exploits to FlashRead More →
Short Bytes: Sarah Jamie Lewis is an independent security researcher who has devised a tool called OnionScan to locate the loopholes in dark web sites. This will allow system admins toRead More →
Anonymous Philippines hacked the COMELEC database, the incident exposed records of more than 55 million voters, it is the biggest gov-related data breach. A few days ago I reported theRead More →
XOR botnet authors migrate to using BillGates malware. Over the past six months, security researchers from Akamai’s SIRT team have observed a shift in the cyber-criminal underground to using botnets createdRead More →
Listeners hear explicit audio caused when station equipment is commandeered. Some Tuesday morning listeners of KIFT, a Top 40 radio station located in Breckenridge, Colorado, were treated to a radically differentRead More →