The creators of a Web-based attack tool called Angler Exploit Kit have added an exploit for a known vulnerability in Microsoft's Silverlight browser plug-in to the tool's arsenal. Exploit kits are essentially malicious Web applications ...
Tags: Computer Products, software
A stealthy malicious software program is taking hold in some of the most popular Web servers, and researchers still don't know why. Last week, security companies Eset and Sucuri found Apache servers infected with Linux/Cdorked. If that ...
Tags: Web software, software, Computer Products
Following its latest threat report, security firm AVG has noted a “disturbing” new trend in the world of cybercrime – children with enough programming skills to code and distribute their own malware. The company said it ...
Tags: AVG, cybercrime, malware
Cyber criminals have moved beyond the traditional PC, targeting Android, social media and even the Mac OS X with new attacks, according to Trend Micro’s 2012 Annual Roundup and Mobile Security reports. Malware targeting Android alone ...
Tags: cyber criminals, traditional PC, Android, social media
Following Google’s recent upgrade of Chrome, a new wave of bogus updates has been set upon the Internet by cyber criminals looking to steal online banking credentials and cause other problems for users. Google released its upgrade ...
Tags: Google, Chrome, cyber criminals, Internet
Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale online. In the past year, cyber criminals have used ...
Tags: Protection, Cyber Crime, Products
An exploit for an unpatched vulnerability in the Microsoft XML Core Services (MSXML) has been incorporated into Blackhole, one of the most widely used Web attack toolkits, according to security researchers from antivirus firm Sophos. The ...
Tags: vulnerability, Microsoft, MSXML, Blackhole, Web attack toolkits
Oracle has released an out-of-cycle security update to patch newly identified vulnerabilities in Java 7 that have been widely exploited, after the security community urged the company not to wait. The move comes hot on the heels of news ...
Tags: Oracle, Metasploit tool, Blackhole exploit kit, Java vulnerabilities
The latest Java zero-day vulnerability is already available to users of the Metasploit tool and Blackhole exploit kit, say security researchers. The Java vulnerability allows attackers to use a custom web page to force systems to download ...
Tags: Metasploit tool, custom web, coded Java, security, FireEye
High-risk and dangerous applications targeting users of Google’s Android platform increased from nearly 30,000 in June to almost 175,000 in September, according to Trend Micro’s security roundup report for the third quarter of ...
Tags: Android, cyber security, devices, malware, Trend Micro
Cyber criminals are increasingly using .eu domain names in their attack campaigns, according to data from multiple security companies. “Numerous malicious .eu domains have been registered during November which are being used to ...
Tags: cyberattacks, cybercrime, highlightedpost, malware
Cyber criminals targeted users of Skype,Facebook and Windows using multiple Blackhole exploits in October,according to the latest threat report from security firm GFI Software. Researchers uncovered a large number of Blackhole exploits ...
Tags: Cyber criminals, Facebook, Windows users, chameleon of internet threats
Unlicensed copies of popular software Keep up to date Patch applications with security updates Conficker still a threat Malicious key generation(keygen)software is one of the fastest-growing types of a malware,according to the latest ...
Tags: top cyber threats, malicious key, malicious keygen software
Google's Android mobile operating system(OS)is under siege by attackers,with malware and information stealing adware targeting the platform up 483%in the last quarter. While Apple's relatively rigorous approach to vetting apps before ...
Tags: Google Android OS, Attackers, open platform, Android apps
Security researchers have discovered a new vulnerability in all supported versions of Oracle Java that enables attackers to bypass sandbox defences. The vulnerability, which affects Java Standard Edition versions 5, 6 and 7, can be used ...
Tags: Java Flaw, Bypass Sandbox, vulnerability, Security Explorations