ALL POSTS Android Botnets Hop on the TOR Train Adam Kujawa February 25, 2014 0 Comments Botnet creators have attempted numerous tactics for hiding their presence, traffic and locations of their command and control (CnC) servers. To… UPDATE: Apple in hot water after SSL/TLS validation fiasco Jérôme Segura February 24, 2014 0 Comments Update (Feb 25): More info on the update can be found here. Original story: Releasing a software update right before the… Fake PayPal “Survey Program” Email Wants Card Details Christopher Boyd February 24, 2014 0 Comments Be wary of emails bearing gifts – in this case, claiming to reward those who would fill in a so-called PayPal… UART, Root Shell On Commercial Devices Jean Taggart February 21, 2014 0 Comments Many embedded devices run a stripped down version of Linux and have poorly documented diagnostic interfaces. In order to find potential… Twitter Spamrun: “Isn’t This You?” Christopher Boyd February 21, 2014 0 Comments Watch out for this spam run taking place on Twitter: The spam spreading on compromised accounts are bundles of @ messages… UMD Hacked, Over 300,000 Records Stolen Joshua Cannell February 20, 2014 0 Comments The University of Maryland (UMD) said it was the victim of a recent cyberattack, according to their statement released Wednesday. In… Kindle Apps: Look Before You Leap Christopher Boyd February 20, 2014 0 Comments With school holidays in the UK slowly winding down (most likely with a cry of “Are they going back in yet”… Adobe Flash Player Zero-Day: details and mitigation Jérôme Segura February 20, 2014 0 Comments Update (02/24/14): This exploit has been found in the wild already. It is blocked by Malwarebytes Anti-Exploit. In a very busy month… Observing COM within Malicious Code Joshua Cannell February 19, 2014 0 Comments Occasionally, malware will take a different route to achieve its desired effects by using Component Object Model objects. Component Object Model,… Previous 1 … 554 555 556 557 558 … 593 Next Contributors Threat Center Podcast Glossary Scams