Please turn on your JavaScript for this page to function normally.
Spam about the Jasmine Revolution leads to malware

By the end of 2010, the total number of Chinese Internet users reached 457 million. That means that even if scammers and hackers concentrate exclusively on that particular …

Spotify has been displaying malicious ads

Streaming music service Spotify has been displaying malicious ads to users of their Free version. The ads lead to websites that used the Blackhole Exploit Kit to infect users …

Highly targeted attacks exploiting Windows MHTML vulnerability

A recent surge in attacks against a variety of sites that exploit a MHTML XSS vulnerability publicly disclosed in January – and which still hasn’t been patched by …

Pwn2Own: iPhone and Blackberry hacked

On the second day of the Pwn2Own contest held at the CanSecWest conference, iPhone and Blackberry devices have been successfully exploited, while the scheduled Android and …

Free, open source exploit kit offered online

Among the various exploit kits for sale out there it seems there is one that aspiring cyber crooks can use for free. Researchers from M86 have stumbled upon it by chance, and …

Two BBC sites serving malware via injected iFrame

A piece of malware detected by only 21 percent of the anti-virus solutions used by VirusTotal is currently being pushed onto unsuspecting visitors of the BBC 6 Music and BBC …

Complex Trojans and next generation malware is on the way

While e-mail users may have noticed a significant drop in spam in recent months, cybercriminals are gaining ground with creative new phishing methods and making exploit kits …

Google offers Pwn2Own contestants $20,000 for Chrome exploit

As during the previous four years, this year’s edition of the CanSecWest conference will welcome security researchers bent on trying to exploit vulnerabilities in …

Serious jump in new vulnerabilities exploitation

On a typical month, exploit activity falls between 30 percent and 40 percent, according to Fortinet. Half of new vulnerabilities rated as “critical” were targeted …

New malware strains wreaking havoc on Facebook

PandaLabs announced the discovery of security exploits via popular social media sites Facebook and Twitter. In the last several days, two new malware strains have been …

Exploit code for critical MS Office flaw exploit found in the wild

A critical vulnerability in the way Microsoft Office handles RTF which can allow an attacker to remotely execute arbitrary code on the victim’s computer has been by …

Adobe PDF format riddled with exploitable features

Adobe’s PDF format and standard has been known for a while now to be easily exploitable and, thus, rather insecure. In the past, attackers have taken advantage not only …

Don't miss

Cybersecurity news