ALL POSTS Dangerous beans: Oracle deep in the storm Jérôme Segura March 6, 2013 0 Comments Last week security researchers from FireEye discovered a new Java exploit that works against the latest versions of Java (version 6… CTA: New Java Zero-Days Joshua Cannell March 4, 2013 0 Comments Update: Oracle has addressed the exploit known as CVE-2013-1493 with an emergency patch. You can read about this patch on Oracle’s… Law Against Cookies Pieter Arntz February 20, 2013 0 Comments In May 2011 the European Union changed the law that covers the use of electronic communications networks to store information, e.g…. Malwarebytes and BSides San Francisco Joshua Cannell February 18, 2013 0 Comments For many years now, computer security conferences have been a common way for researchers, hackers, and security experts to meet and… Q&A about ransomware featuring Eric Freyssinet Jérôme Segura February 15, 2013 0 Comments This week I am talking with Eric Freyssinet, head of a national cybercrime investigative unit in France. We discuss ransomware and… CTA: New Adobe Zero-Day Joshua Cannell February 14, 2013 0 Comments URGENT: A few days ago a new zero-day vulnerability in Adobe Reader had surfaced. Details below are on Adobe’s blog. Text Popups Pieter Arntz February 13, 2013 0 Comments What is a text popup?A text popup is a link that opens a popup box containing advertisements, usually prompted by a… Tools of the Trade: Exploit Kits Joshua Cannell February 11, 2013 0 Comments Exploit Kits are a serious cyber threat today, estimated to be responsible for the vast percentage of malware infections worldwide. Exploit… Sandbox Sensitivity Pieter Arntz February 5, 2013 0 Comments This article is meant to give you an overview of how sandboxes are used and why malware writers try to avoid… Previous 1 … 607 608 609 610 611 … 615 Next Contributors Threat Center Podcast Glossary Scams