Emergence of blended malware attacks lead concern for 2011
CoreTrace released their top security predictions for 2011. “The major theme in for 2011 will be evolution. The evolution of attacks like Stuxnet, the evolution of new …
Twitter spam campaign leads to computer-hijacking rogue AV
Malicious shortened goo.gl links and compromised accounts are once again used to lure users to pages that will ultimately harm their computer. A message saying “a very …
Malicious .rtf file exploits MS Office flaw
A stack-based buffer overflow vulnerability in Microsoft Office has recently been spotted being exploited in the wild by attackers aiming at getting control of targeted …
New Trojan hijacks shortcuts to ensure its execution
A new information-stealing Trojan that seems to be Chinese in origin has been detected by Avira’ researchers. It is designed to steal usernames and passwords associated …
Hacktivism and social engineering emerge as top threats
Hacktivism and more profit-oriented malware, social engineering and malicious codes with the ability to adapt to avoid detection will be the main threats in the coming year, …
Week in review: Assange arrested, 2011 threat landscape and first VoIP call from space
Here’s an overview of some of last week’s most interesting news and articles: McAfee’s Secure Short URL Service not so secure M86 Security Labs’ …
Growth in social networking, mobile and infrastructure attacks
IID released its list of the top enterprise security trends for 2011. Some specific areas that will have significant spikes in attacks are social networking, mobile, and …
Amazon profiles abused by spammers and malware pushers
Experience has proven that if a site enables users to contribute content, this feature will be abused by those who want to push their own agenda – usually spammers. This …
Using social networks safely
Everyone uses social networks like Facebook, Twitter or LinkedIn. Although these fantastic sites do have their upside, they also open users up to more computer viruses and …
Exploit code for still unpatched 0-day used by Stuxnet released
After Stuxnet hit, it was discovered that it took advantage of four previously unknown Windows zero-day vulnerabilities to spread and compromise targeted systems. Three of …
GoDaddy-hosted websites injected with malicious code
Webmasters of websites hosted on GoDaddy have to check their source code yet again, as attackers using a number of different domains inject rogue code into their pages, which …
Fake Twitter warnings lure users to potentially malicious site
Twitter users are often targeted with various fake messages purportedly coming from the microblogging service, and these e-mails usually try to trick the users into clicking …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments