ALL POSTS Fake PayPal “Survey Program” Email Wants Card Details Christopher Boyd February 24, 2014 0 Comments Be wary of emails bearing gifts – in this case, claiming to reward those who would fill in a so-called PayPal… UART, Root Shell On Commercial Devices Jean Taggart February 21, 2014 0 Comments Many embedded devices run a stripped down version of Linux and have poorly documented diagnostic interfaces. In order to find potential… Twitter Spamrun: “Isn’t This You?” Christopher Boyd February 21, 2014 0 Comments Watch out for this spam run taking place on Twitter: The spam spreading on compromised accounts are bundles of @ messages… UMD Hacked, Over 300,000 Records Stolen Joshua Cannell February 20, 2014 0 Comments The University of Maryland (UMD) said it was the victim of a recent cyberattack, according to their statement released Wednesday. In… Kindle Apps: Look Before You Leap Christopher Boyd February 20, 2014 0 Comments With school holidays in the UK slowly winding down (most likely with a cry of “Are they going back in yet”… Adobe Flash Player Zero-Day: details and mitigation Jérôme Segura February 20, 2014 0 Comments Update (02/24/14): This exploit has been found in the wild already. It is blocked by Malwarebytes Anti-Exploit. In a very busy month… Observing COM within Malicious Code Joshua Cannell February 19, 2014 0 Comments Occasionally, malware will take a different route to achieve its desired effects by using Component Object Model objects. Component Object Model,… Compromised user accounts posted on Pastebin Armando Orozco February 19, 2014 0 Comments Proof is a key component to hacking and some hackers have been taking to Pastebin to share their spoils. A recent… No, Valve is NOT Collecting your Browsing History Christopher Boyd February 18, 2014 0 Comments If you play games on Steam, you’ll likely have fired up a title at some point which uses VAC – Valve… Previous 1 … 563 564 565 566 567 … 602 Next Contributors Threat Center Podcast Glossary Scams