ALL POSTS Streaming Netflix on your PC? Beware of Silverlight exploit Jérôme Segura November 15, 2013 0 Comments A vulnerability affecting Microsoft Silverlight 5 is live and infecting PCs that visit compromised or malicious websites. Developed by Microsoft, Silverlight is a framework… PIN Skimmer wants to know where you’re looking Armando Orozco November 14, 2013 0 Comments Mobile devices have become targets for malware and researchers alike, the latest news is on how our devices can be exploited… Cracked.com Found Serving Malware Joshua Cannell November 14, 2013 0 Comments In perhaps a bit of irony, the humor website cracked.com was flagged by Google’s Safe Browsing Technology. Cracked.com is a website… Ransomware demands additional payment to delete ‘criminal records’ Jérôme Segura November 13, 2013 0 Comments Back in July 2013, we had discovered a new method of spreading the infamous FBI ransomware by using JavaScript code and iframes… Bitcoins, Pools and Thieves Adam Kujawa November 12, 2013 0 Comments Bitcoin started out as a digital currency, free from duplication and free from centralization and assumed, free from organized crime. However… Microsoft 0-Days: An Explanation and Safety Tips Jérôme Segura November 11, 2013 0 Comments [Update]: Microsoft has announced it will issue a patch for the newly discovered IE zero day tomorrow as part of the… A nefarious use of Google Drive to load malicious redirects Jérôme Segura November 11, 2013 0 Comments A lesser known aspect of the popular cloud storage Google Drive is its built-in site publishing feature that allows you to… Sourceforge Drives off Downloads, Ask why Jean Taggart November 8, 2013 0 Comments Are we are starting to see the beginning of an exodus away from SourceForge as a hosting solution for software projects?… Security: Finding the balance Pieter Arntz November 8, 2013 0 Comments Finding the balance between security and ease of use. A computer system, or almost anything else for that matter, can never… Previous 1 … 564 565 566 567 568 … 592 Next Contributors Threat Center Podcast Glossary Scams