GPS Software Attacks More Dangerous Than Jamming and Spoofing, Experts Say

GPS Software Attacks More Dangerous Than Jamming and Spoofing, Experts Say

Carnegie Mellon University researchers have identified new attack vectors

Malware Disguised as Trend Micro Product Spreads Bitcoin Miner

Malware Disguised as Trend Micro Product Spreads Bitcoin Miner

These types of threats help cybercriminals make a decent profit

Details of Several Critical Vulnerabilities in Maxthon and Avant Browsers Published

Details of Several Critical Vulnerabilities in Maxthon and Avant Browsers Published

Roberto Suggi Liverani has made available technical documentation and videos

Necurs Malware Infects over 83,000 Machines in November 2012, Microsoft Says

Necurs Malware Infects over 83,000 Machines in November 2012, Microsoft Says

Experst have thoroughly analyzed this dangerous threat

BlackHole Exploit Kit Has Difficulties in Infecting Chrome Users, Experts Say

BlackHole Exploit Kit Has Difficulties in Infecting Chrome Users, Experts Say

Unlike Firefox or IE, Google's browser is not so easy to attack

Pakistani Hackers Flood Pastebin with Links to Compromised Sites

Pakistani Hackers Flood Pastebin with Links to Compromised Sites

Websense researchers noticed a spike on November 20

Eurograbber Campaign Steals over €35 Million from European Bank Customers

Eurograbber Campaign Steals over €35 Million from European Bank Customers

30,000 accounts belonging to companies and individuals have been breached

Users Advised to Disable Smart Card for Protection Against Shylock Malware

Users Advised to Disable Smart Card for Protection Against Shylock Malware

This method is used to trick the threat into thinking that it's being analyzed

DefCamp 2012: Flaws in Mobile Networks Allow Users to Surf the Web for Free

DefCamp 2012: Flaws in Mobile Networks Allow Users to Surf the Web for Free

Security researcher Bogdan Alecu has demonstrated how this can be done

Hackers Can Use Twitter SMS Vulnerability to Post on Users’ Behalves, Expert Finds (Updated)

Hackers Can Use Twitter SMS Vulnerability to Post on Users’ Behalves, Expert Finds (Updated)

The attack relies on spoofing the number from which the message originates

ZeuS and Changeup Malware Help Each Other Spread, Experts Find

ZeuS and Changeup Malware Help Each Other Spread, Experts Find

Symantec experts have located the source of the Changeup worm

Tumblr Worm Might Have Leveraged Stored XSS Vulnerability, Expert Says

Tumblr Worm Might Have Leveraged Stored XSS Vulnerability, Expert Says

According to Janne Ahlberg, the issue is still not fixed

Sophos Releases Technical Paper on BlackHole Exploit Kit

Sophos Releases Technical Paper on BlackHole Exploit Kit

Researchers believe that the malicious element has been developed in Russia

DefCamp 2012: Bypassing Security Tokens for Exploitation of Rounding Vulnerabilities

DefCamp 2012: Bypassing Security Tokens for Exploitation of Rounding Vulnerabilities

Presentation of a clever device developed by Adrian Furtuna

New Version of Changeup Malware Found Targeting India, Mexico, Other Countries

New Version of Changeup Malware Found Targeting India, Mexico, Other Countries

Symantec experts are currently monitoring the updated variant

Cybercriminals Sell Apache-Based iFrame Injection Module for $1,000 (€800)

Cybercriminals Sell Apache-Based iFrame Injection Module for $1,000 (€800)

Some clever techniques are deployed to make the tool stealthy

PlugX RAT Developers Release New Version, Become More Confident

PlugX RAT Developers Release New Version, Become More Confident

Kaspersky experts have found that the error logging function has been removed

 
Want more? Browse: