Advisories  

  •  
  • By Ionut Ilascu
  • September 24th, 2014
Payment Information Compromised at 216 Jimmy John’s Locations

Payment Information Compromised at 216 Jimmy John’s Locations

Intruders gained access to info through POS system vendor

  •  
  • By Ionut Ilascu
  • September 10th, 2014
Fraudsters Pose as Police, Ask for Money to Solve Outstanding Warrant Issue

Fraudsters Pose as Police, Ask for Money to Solve Outstanding Warrant Issue

The money is hard to trace, scammers receive payment via pre-paid cards

  •  
  • By Ionut Ilascu
  • August 5th, 2014
eBay’s Magento ProStore Receives Security Fix

eBay’s Magento ProStore Receives Security Fix

Researchers demonstrate proof-of-concept in video

  •  
  • By Ionut Ilascu
  • August 4th, 2014
Private Video Scam Leads to Surveys and Malware

Private Video Scam Leads to Surveys and Malware

Crooks get creative and promise access to restricted video

  •  
  • By Ionut Ilascu
  • August 1st, 2014
Symantec Publishes Advisory for Mitigating Zero-Day Risks

Symantec Publishes Advisory for Mitigating Zero-Day Risks

Developer considers risk as being of medium severity

  •  
  • By Ionut Ilascu
  • July 30th, 2014
Malicious Android Apps Can Impersonate Trusted Ones

Malicious Android Apps Can Impersonate Trusted Ones

The apps' unique ID can be copied and used for malicious purposes

  •  
  • By Ionut Ilascu
  • July 29th, 2014
Instagram Account Hijack Code Published

Instagram Account Hijack Code Published

Developer did not receive Facebook bounty, makes public disclosure

  •  
  • By Ionut Ilascu
  • July 3rd, 2014
Cisco Confirms Security Risks in Unified Communications Domain Manager

Cisco Confirms Security Risks in Unified Communications Domain Manager

Default backdoor SSH key gives root privileges to an attacker

  •  
  • By Ionut Ilascu
  • July 2nd, 2014
MailPoet WordPress Plugin Affected by Security Flaw

MailPoet WordPress Plugin Affected by Security Flaw

Unpatched version allows attackers to upload files without authentication

  •  
  • By Ionut Ilascu
  • June 23rd, 2014
Gruesome Video Used as Bait in Facebook Scam

Gruesome Video Used as Bait in Facebook Scam

Survey scammers claim as many victims as they can

  •  
  • By Ionut Ilascu
  • June 20th, 2014
BMC Vulnerability Exposes Admin Passwords in Plain Text

BMC Vulnerability Exposes Admin Passwords in Plain Text

Thousands of servers seem to be affected by the vulnerability

  •  
  • By Ionut Ilascu
  • June 13th, 2014
Facebook Accounts Are Gold for Cybercrooks

Facebook Accounts Are Gold for Cybercrooks

Spot phishing attempts and avoid becoming a victim

  •  
  • By Ionut Ilascu
  • June 12th, 2014
Wi-Fi Spots and Malicious Chargers

Wi-Fi Spots and Malicious Chargers

Avoid untrusted or unknown charging points and Wi-Fi networks

  •  
  • By Eduard Kovacs
  • April 7th, 2014
Experts Share Thoughts on Beginnings and Evolution of Ransomware

Experts Share Thoughts on Beginnings and Evolution of Ransomware

A number of renowned researchers have contributed to Bart Blaze's report

  •  
  • By Eduard Kovacs
  • March 20th, 2014
Experts Explain How Wildcard Certificates Are Being Abused for Phishing Attacks

Experts Explain How Wildcard Certificates Are Being Abused for Phishing Attacks

Here are some recommendations on how to protect your web server against such attacks

  •  
  • By Eduard Kovacs
  • March 13th, 2014
If You’ve Already Received the FIFA World Cup Ticket Purchased Online, It’s Fake

If You’ve Already Received the FIFA World Cup Ticket Purchased Online, It’s Fake

FIFA has published a video with recommendations on how to purchase tickets

  •  
  • By Eduard Kovacs
  • March 7th, 2014
Fake Windows 8.1 Enterprise Activators Hide Adware, Bitcoin Miners

Fake Windows 8.1 Enterprise Activators Hide Adware, Bitcoin Miners

Take a look at how these bogus activators trick users into installing shady software

 
Want more? Browse: