[img_assist|nid=2415|title=|desc=|link=none|align=right|width=120|height=76]Even the latest images in Google’s reCAPTCHA can be cracked with sufficient reliability to allow protective services to be exploited. Read the full article. [The H Security]
Browsing Tag: malware
[img_assist|nid=2408|title=|desc=|link=none|align=left|width=100|height=100]Cybercrime affiliates of unlicensed pharmaceutical websites have begun
moving on from attacks purely designed to poison Google search engine
results, and are now targeting Microsoft’s web properties. Read the full article. [The Register]
[img_assist|nid=2402|title=|desc=|link=none|align=left|width=100|height=100]By Dmitry BestuzhevThe day before yesterday, we saw reports about how search engine queries for “Brittany Murphy” returned sites containing links to malware. So it’s the usual situation, with the bad guys exploiting the death of a famous person, just like they did with Michael Jackson.
[img_assist|nid=2396|title=|desc=|link=none|align=left|width=100|height=100]A new clickjacking attack has targeted Facebook users with photos and images posted in the comments section. Read the full article. [Help Net Security]
[img_assist|nid=2384|title=|desc=|link=none|align=left|width=100|height=100]Cybercriminals have already begun shifting their focus from websites to
file-sharing networks when it comes to dispensing malware, and will
continue with this trend throughout 2010 with more mobile malware to come. Read the full article. [Ars Technica]
[img_assist|nid=2382|title=|desc=|link=none|align=right|width=100|height=100]Intel has released a patch for its series of silicon-based security
protections after researchers from Poland identified flaws that allowed
them to completely bypass the extensions. Read the full article. [The Register]
The malware writers and criminals who run botnets for years have been using shared hosting platforms and so-called bulletproof hosting providers as bases of operations for their online crimes. But, as law enforcement agencies and security experts have moved to take these providers offline, the criminals have taken the next step and begun setting up their own virtual data centers.
[img_assist|nid=2356|title=|desc=|link=none|align=left|width=100|height=100]The iKee worm that was infecting jailbroken iPhones last month was a simple, yet effective, piece of software that shows how easy it might be for an attacker to create a fairly large, functioning botnet comprising mobile devices, an analysis of the worm shows.
[img_assist|nid=2333|title=|desc=|link=none|align=right|width=100|height=100]Version 2.1 of the Cloud Security Alliance’s “Guidance for Critical Areas of Focus in Cloud Computing” provides more concise and actionable guidance across all
domains, and encompasses knowledge gained from real world deployments
over the past six months. Read the full article. [Help Net Security]
A Chinese court Wednesday sentenced 11 members of a malware ring for writing and distributing Read the full article. [IDG News Service]viruses meant to steal online game account passwords, according to state media.