Please turn on your JavaScript for this page to function normally.
Teen exploits three 0-days to hack Chrome, earns $60K from Google

The end of this year’s editions of the Pwn2Own and Pwnium contests has been marked by another Chrome hack, executed by a teenage security researcher that goes by the …

Flash vulnerability exploited to deliver malware

Attackers are once again exploiting the public’s tendency for not keeping its software updated and its ongoing interest about Iran and its nuclear program to infect …

Bogus US SEC notification leads to malware

Notifications purportedly sent by the US Securities and Exchange Commission have been hitting inboxes and trying to trick users into following a malicious link, warns GFI. The …

Eliminating malware resident on file shares

FireEye announced its File Malware Protection System (MPS) that detects and eliminates advanced malware found on file shares. The solution prevents the lateral spread of …

Pastry lovers served with ransomware via exploit kit

French cake and pastry lovers have been targeted by cyber crooks as the website of the famous confectionery company Laduree has been compromised and found serving ransomware. …

Metasploit identifies IPv6 security risks

Rapid7 announced that the new version of Metasploit 4.2 allows users to fully test whether IPv6 addresses on their network are vulnerable to cyber attacks. This is …

Gap in patch priorities vs cybercriminal targets

Internet users are at risk from the rapid growth in software security flaws – specifically end-point vulnerabilities. Businesses should be doing far more to help …

The evolution of targeted attacks and exploit kits

There’s been a significant growth in cybercrime, via sophisticated targeted attacks and social media scams, as well as a rise in malicious email attachments, despite a …

Cybercriminals tailoring tactics for maximum appeal

GFI Software released its report on the most prevalent threat detections encountered during January. Last month saw malware attacks targeting a wide range of potential …

Convincing tax-themed spam leads to malware

With the US tax season underway, users are constantly being targeted with tax-themed spam. The latest one to be spotted is an email purportedly coming from Inuit, a US company …

Compromised WordPress sites lead to Phoenix exploit kit

Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …

PoC exploits for Linux privilege escalation bug published

The publication of proof-of-concept exploit code for a recently spotted privilege escalation flaw (CVE-2012-0056 ) in the Linux kernel has left Linux vendors scrambling to …

Don't miss

Cybersecurity news