ALL POSTS Ransomware demands additional payment to delete ‘criminal records’ Jérôme Segura November 13, 2013 0 Comments Back in July 2013, we had discovered a new method of spreading the infamous FBI ransomware by using JavaScript code and iframes… Bitcoins, Pools and Thieves Adam Kujawa November 12, 2013 0 Comments Bitcoin started out as a digital currency, free from duplication and free from centralization and assumed, free from organized crime. However… Microsoft 0-Days: An Explanation and Safety Tips Jérôme Segura November 11, 2013 0 Comments [Update]: Microsoft has announced it will issue a patch for the newly discovered IE zero day tomorrow as part of the… A nefarious use of Google Drive to load malicious redirects Jérôme Segura November 11, 2013 0 Comments A lesser known aspect of the popular cloud storage Google Drive is its built-in site publishing feature that allows you to… Sourceforge Drives off Downloads, Ask why Jean Taggart November 8, 2013 0 Comments Are we are starting to see the beginning of an exodus away from SourceForge as a hosting solution for software projects?… Security: Finding the balance Pieter Arntz November 8, 2013 0 Comments Finding the balance between security and ease of use.A computer system, or almost anything else for that matter, can never be… New DoS Tool Discovered, Aimed at Healthcare.gov Joshua Cannell November 7, 2013 0 Comments As plenty of news coverage surrounding the technical difficulties on the Obamacare website continues, a new Denial of Service (DoS) tool… Android Trojan gets an update Armando Orozco November 7, 2013 0 Comments The Android Trojan Svpeng, first reported by Kaspersky, has some new functionality and is now capable of phishing and stealing banking… Hacked and Unpacked: The Piratebox Jean Taggart November 6, 2013 0 Comments Some time ago I showcased the Wi-Fi pineapple, a small portable Wi-Fi access point modified with a custom firmware to be used as… Previous 1 … 590 591 592 593 594 … 617 Next Contributors Threat Center Podcast Glossary Scams