Cyber criminals are increasingly using .eu domain names in their attack campaigns, according to data from multiple security companies. “Numerous malicious .eu domains have been registered during November which are being used to ...
Tags: cyberattacks, cybercrime, highlightedpost, malware
Cybercriminals are using a new PDF exploit that bypasses the sandbox security features in Adobe Reader X and XI, in order to install banking malware on computers, according to researchers from Russian security firm Group-IB. The zero-day ...
Tags: PDF, Cybercriminals, Adobe Reader, Group-IB
Adobe is aiming to make document collaboration more straightforward with the latest version of its PDF software. According to Adobe, a central feature of the version is the ability to edit documents and reuse elements of existing ...
Tags: Adobe, PDF software, PDF documents, Microsoft PowerPoint slides
Google yesterday patched 24 vulnerabilities in Chrome,and paid out$29,500 in bounties to nine researchers,more than half of that to one of the company's most prolific bug finders. Chrome 22,which Google started pushing to current users on ...
Tags: Google, Chrome Bugs, vulnerabilities
"The number of fronts of risk and war, as some people call it, are definitely multiplying," says Clinton McFadden, senior operations manager for IBM X-Force research and development, which just released the results of its X-Force 2012 ...
Tags: Cyberwarfare, Trend and Risk Report., IBM, US
Hackers are distributing rogue email notifications about changes in Microsoft's Services Agreement to trick people into visiting malicious pages that use a recently circulated Java exploit to infect their computers with malware. "We're ...
Tags: Malware, Vulnerabilitie, rogue email notification, malicious email
Infoworld - When it comes to IT security, FUD (fear, uncertainty, and doubt) is more than just the tool of overhyping vendors hoping to sell their next big thing. It is the reality that seasoned IT security pros live in, thanks in large ...
Tags: IT security, FUD, Paul Ferguson, antivirus scanner
A widespread spam attack linking to malware has broken out on Twitter, according to the security firm Sophos. The malicious tweets often read "It's you on photo?" or "It's about you?" The tweets and URLs often include a user's Twitter ...
Tags: Twitter, spam attack, USA, malware, vulnerabilities
Twitter users are being targeted by tweets containing malicious links that claim recipients are pictured in an online photo. These malicious links are being spammed across the micro-blogging site, warned security firm Sophos. The ...
Tags: Twitter, malicious links, online photo, micro-blogging site, browsers
New email-based attacks, some of which target the aerospace industry, are distributing new variants of the Sykipot information stealing malware, according to researchers from security firm AlienVault. "We have detected a new wave of ...