ALL POSTS Adobe Flash Player Zero-Day: details and mitigation Jérôme Segura February 20, 2014 0 Comments Update (02/24/14): This exploit has been found in the wild already. It is blocked by Malwarebytes Anti-Exploit.In a very busy month for… Observing COM within Malicious Code Joshua Cannell February 19, 2014 0 Comments Occasionally, malware will take a different route to achieve its desired effects by using Component Object Model objects.Component Object Model, abbreviated… Compromised user accounts posted on Pastebin Armando Orozco February 19, 2014 0 Comments Proof is a key component to hacking and some hackers have been taking to Pastebin to share their spoils.A recent study… No, Valve is NOT Collecting your Browsing History Christopher Boyd February 18, 2014 0 Comments If you play games on Steam, you’ll likely have fired up a title at some point which uses VAC – Valve… “Hungry Bear Tears Woman to Pieces” Facebook Video Scam Christopher Boyd February 18, 2014 0 Comments Here’s a Facebook scam / fake video currently in circulation. Warning: a generally terrible standard of English used throughout: “Shocking Video:… Hiding in plain sight: a story about a sneaky banking Trojan Jérôme Segura February 17, 2014 0 Comments The Zeus/Zbot Trojan is one the most notorious banking Trojans ever created; it’s so popular it gave birth to many offshoots… Application Spams “My Top Followers” Posts To Tumblr Users Christopher Boyd February 17, 2014 0 Comments Way back in June 2013 a website was asking users of Tumblr to add a “HTML widget” (or, more likely, to… New Internet Explorer 10 zero-day used in targeted attacks Jérôme Segura February 14, 2014 0 Comments A new and currently unpatched flaw affecting Internet Explorer 10 (CVE-2014-0322) has been discovered on some highly targeted websites, indicating a… Bitcoin Theft in the Underground Adam Kujawa February 14, 2014 0 Comments This week, news came out that Silk Road 2, the underground marketplace specializing in nefarious services, had all of its Bitcoins… Previous 1 … 575 576 577 578 579 … 614 Next Contributors Threat Center Podcast Glossary Scams