Please turn on your JavaScript for this page to function normally.
Highly targeted attacks exploiting Windows MHTML vulnerability

A recent surge in attacks against a variety of sites that exploit a MHTML XSS vulnerability publicly disclosed in January – and which still hasn’t been patched by …

Pwn2Own: iPhone and Blackberry hacked

On the second day of the Pwn2Own contest held at the CanSecWest conference, iPhone and Blackberry devices have been successfully exploited, while the scheduled Android and …

Free, open source exploit kit offered online

Among the various exploit kits for sale out there it seems there is one that aspiring cyber crooks can use for free. Researchers from M86 have stumbled upon it by chance, and …

Two BBC sites serving malware via injected iFrame

A piece of malware detected by only 21 percent of the anti-virus solutions used by VirusTotal is currently being pushed onto unsuspecting visitors of the BBC 6 Music and BBC …

Complex Trojans and next generation malware is on the way

While e-mail users may have noticed a significant drop in spam in recent months, cybercriminals are gaining ground with creative new phishing methods and making exploit kits …

Google offers Pwn2Own contestants $20,000 for Chrome exploit

As during the previous four years, this year’s edition of the CanSecWest conference will welcome security researchers bent on trying to exploit vulnerabilities in …

Serious jump in new vulnerabilities exploitation

On a typical month, exploit activity falls between 30 percent and 40 percent, according to Fortinet. Half of new vulnerabilities rated as “critical” were targeted …

New malware strains wreaking havoc on Facebook

PandaLabs announced the discovery of security exploits via popular social media sites Facebook and Twitter. In the last several days, two new malware strains have been …

Exploit code for critical MS Office flaw exploit found in the wild

A critical vulnerability in the way Microsoft Office handles RTF which can allow an attacker to remotely execute arbitrary code on the victim’s computer has been by …

Adobe PDF format riddled with exploitable features

Adobe’s PDF format and standard has been known for a while now to be easily exploitable and, thus, rather insecure. In the past, attackers have taken advantage not only …

GSM cracking is all about knowledge, not money

Since the cracking of GSM encryption back in December 2009 by encryption expert Karsten Nohl, the cost of setting up an operation that includes sniffing out the calls made by …

Fake iTunes e-mail leads to drive-by download

E-mails purportedly coming from iTunes and bearing “iTunes account may be suspended” in the subject line have been hitting inboxes in the last few days. …

Don't miss

Cybersecurity news