The latest Java zero-day vulnerability is already available to users of the Metasploit tool and Blackhole exploit kit, say security researchers. The Java vulnerability allows attackers to use a custom web page to force systems to download ...
Tags: Metasploit tool, custom web, coded Java, security, FireEye
High-risk and dangerous applications targeting users of Google’s Android platform increased from nearly 30,000 in June to almost 175,000 in September, according to Trend Micro’s security roundup report for the third quarter of ...
Tags: Android, cyber security, devices, malware, Trend Micro
Cyber criminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. Three months ...
Tags: Black Market, malware, Proxy, Symantec, Computers
Attackers using two recently-uncovered Java unpatched vulnerabilities, or "zero-days," have quickly expanded their reach by going mainstream, security experts said today. And on Tuesday, Mozilla, maker of Firefox, joined the chorus of ...
Tags: Java, unpatched vulnerabilities, mainstream, security experts
Attacks targeting an unpatched vulnerability in the latest versions of Java 7 have become widespread after an exploit for the new flaw was integrated into the popular Blackhole attack toolkit, according to security researchers from ...
Tags: Java 7, unpatched vulnerability, attacks, exploit for flaw
Cyber criminals are increasingly using .eu domain names in their attack campaigns, according to data from multiple security companies. “Numerous malicious .eu domains have been registered during November which are being used to ...
Tags: cyberattacks, cybercrime, highlightedpost, malware
Cyber criminals targeted users of Skype,Facebook and Windows using multiple Blackhole exploits in October,according to the latest threat report from security firm GFI Software. Researchers uncovered a large number of Blackhole exploits ...
Tags: Cyber criminals, Facebook, Windows users, chameleon of internet threats
Twitter has apologised after telling members their accounts had been hacked and forcing them to reset their passwords. Twitter sent out a"large number"of emails telling members to change their log-in details,but gave no indication of the ...
Tags: Twitter, apologises, unnecessary hacking warnings, protect users
Cybercriminals are using a new PDF exploit that bypasses the sandbox security features in Adobe Reader X and XI, in order to install banking malware on computers, according to researchers from Russian security firm Group-IB. The zero-day ...
Tags: PDF, Cybercriminals, Adobe Reader, Group-IB
Unlicensed copies of popular software Keep up to date Patch applications with security updates Conficker still a threat Malicious key generation(keygen)software is one of the fastest-growing types of a malware,according to the latest ...
Tags: top cyber threats, malicious key, malicious keygen software
Google's Android mobile operating system(OS)is under siege by attackers,with malware and information stealing adware targeting the platform up 483%in the last quarter. While Apple's relatively rigorous approach to vetting apps before ...
Tags: Google Android OS, Attackers, open platform, Android apps
Security researchers have discovered a new vulnerability in all supported versions of Oracle Java that enables attackers to bypass sandbox defences. The vulnerability, which affects Java Standard Edition versions 5, 6 and 7, can be used ...
Tags: Java Flaw, Bypass Sandbox, vulnerability, Security Explorations
Hackers are distributing rogue email notifications about changes in Microsoft's Services Agreement to trick people into visiting malicious pages that use a recently circulated Java exploit to infect their computers with malware. "We're ...
Tags: Malware, Vulnerabilitie, rogue email notification, malicious email
Oracle knew since April about the existence of the two unpatched Java 7 vulnerabilities that are currently being exploited in malware attacks,according to Adam Gowdiak,the founder and CEO of Polish security firm Security Explorations. ...
While java hacks are an almost weekly occurrence,a zero-day exploit discovered yesterday looks set to become unusually disruptive,as Oracle has so far offered no solution,and experts are recommending users turn off Java off unless ...
Tags: Java exploit, attacks escalate, Oracle, Java 7