ALL POSTS Ransomware demands additional payment to delete ‘criminal records’ Jérôme Segura November 13, 2013 0 Comments Back in July 2013, we had discovered a new method of spreading the infamous FBI ransomware by using JavaScript code and iframes… Bitcoins, Pools and Thieves Adam Kujawa November 12, 2013 0 Comments Bitcoin started out as a digital currency, free from duplication and free from centralization and assumed, free from organized crime. However… Microsoft 0-Days: An Explanation and Safety Tips Jérôme Segura November 11, 2013 0 Comments [Update]: Microsoft has announced it will issue a patch for the newly discovered IE zero day tomorrow as part of the… A nefarious use of Google Drive to load malicious redirects Jérôme Segura November 11, 2013 0 Comments A lesser known aspect of the popular cloud storage Google Drive is its built-in site publishing feature that allows you to… Sourceforge Drives off Downloads, Ask why Jean Taggart November 8, 2013 0 Comments Are we are starting to see the beginning of an exodus away from SourceForge as a hosting solution for software projects?… Security: Finding the balance Pieter Arntz November 8, 2013 0 Comments Finding the balance between security and ease of use. A computer system, or almost anything else for that matter, can never… New DoS Tool Discovered, Aimed at Healthcare.gov Joshua Cannell November 7, 2013 0 Comments As plenty of news coverage surrounding the technical difficulties on the Obamacare website continues, a new Denial of Service (DoS) tool… Android Trojan gets an update Armando Orozco November 7, 2013 0 Comments The Android Trojan Svpeng, first reported by Kaspersky, has some new functionality and is now capable of phishing and stealing banking… Hacked and Unpacked: The Piratebox Jean Taggart November 6, 2013 0 Comments Some time ago I showcased the Wi-Fi pineapple, a small portable Wi-Fi access point modified with a custom firmware to be used as… Previous 1 … 564 565 566 567 568 … 591 Next Contributors Threat Center Podcast Glossary Scams