ALL POSTS Compromised user accounts posted on Pastebin Armando Orozco February 19, 2014 0 Comments Proof is a key component to hacking and some hackers have been taking to Pastebin to share their spoils. A recent… No, Valve is NOT Collecting your Browsing History Christopher Boyd February 18, 2014 0 Comments If you play games on Steam, you’ll likely have fired up a title at some point which uses VAC – Valve… “Hungry Bear Tears Woman to Pieces” Facebook Video Scam Christopher Boyd February 18, 2014 0 Comments Here’s a Facebook scam / fake video currently in circulation. Warning: a generally terrible standard of English used throughout: “Shocking Video:… Hiding in plain sight: a story about a sneaky banking Trojan Jérôme Segura February 17, 2014 0 Comments The Zeus/Zbot Trojan is one the most notorious banking Trojans ever created; it’s so popular it gave birth to many offshoots… Application Spams “My Top Followers” Posts To Tumblr Users Christopher Boyd February 17, 2014 0 Comments Way back in June 2013 a website was asking users of Tumblr to add a “HTML widget” (or, more likely, to… New Internet Explorer 10 zero-day used in targeted attacks Jérôme Segura February 14, 2014 0 Comments A new and currently unpatched flaw affecting Internet Explorer 10 (CVE-2014-0322) has been discovered on some highly targeted websites, indicating a… Bitcoin Theft in the Underground Adam Kujawa February 14, 2014 0 Comments This week, news came out that Silk Road 2, the underground marketplace specializing in nefarious services, had all of its Bitcoins… Using Good Code for Bad Things Joshua Cannell February 13, 2014 0 Comments It’s quite common for malware to take code from the Windows API and use it for a malicious purpose. For example,… One-ring Phone Scams on the Rise Armando Orozco February 13, 2014 0 Comments Have you recently had a call come through, that suspiciously only rang once, and had the urge to call back? If… Previous 1 … 555 556 557 558 559 … 593 Next Contributors Threat Center Podcast Glossary Scams