[img_assist|nid=3057|title=|desc=|link=none|align=left|width=100|height=100]Adware slingers have taken advantage of the buzz around the latest version of Firefox to establish a fake browser download site. Read the full article. [The Register]
Browsing Tag: malware
MOSCOW–The problem of attackers infecting legitimate Web sites with malware that then silently exploits vulnerabilities in users’ browsers reached unprecedented levels in 2009, with 1 in every 150 legitimate sites serving up malware, experts say.
[img_assist|nid=3048|title=|desc=|link=none|align=left|width=100|height=100]Twitter revealed more details about the phishing attacks that caused the company to reset the passwords on some user accounts Feb. 2. Read the full article. [eWEEK]
[img_assist|nid=3002|title=|desc=|link=none|align=left|width=81|height=137]More than 300 Web sites are being pestered by infected computers that are part of the Pushdo botnet, according to security researchers. Read the full article. [Security Central]
[img_assist|nid=2993|title=|desc=|link=none|align=right|width=100|height=100]Google may have threatened to leave China in order to keep us all from concluding that “the cloud” can’t be secured. But isn’t that precisely what we should conclude based on the fact that Google chose to leave China? Read the full article. [Computerworld]
[img_assist|nid=2994|title=|desc=|link=none|align=right|width=100|height=100]MOSCOW — Attackers have been focusing a lot of attention on social networking destinations such as Facebook, Twitter and even LinkedIn for some time now, but they recently have begun shifting their tactics to make their attacks much more effective and precise through the use of geolocation and profiling.
[img_assist|nid=2978|title=|desc=|link=none|align=left|width=100|height=100]According to researchers, cybercriminals are trying to
sell hacked Twitter user names and passwords online for hundreds of
dollars and as much as $1000. Read the full article. [Computerworld]
[img_assist|nid=2977|title=|desc=|link=none|align=right|width=100|height=100]The recently released APWG Phishing Activity Trends Report for Q3 of 2009, details record highs in multiple phishing vectors, but also offers an interesting observation on desktop crimeware infections. Read the full article. [ZDNet]
[img_assist|nid=2979|title=|desc=|link=none|align=left|width=100|height=100]A vast majority of voice encryption products are seriously flawed, according to controversial tests by an anonymous hacker.
Using the commercially available FlexiSpy wiretapping utility and a
‘homemade’ Trojan, Notrax (the anonymous hacker’s nickname) claims to
have defeated 11 out of 15 voice encryption technologies in tests. Read the full article. [The Register]
By Gunter Ollmann, Damballa[img_assist|nid=2970|title=|desc=|link=none|align=left|width=100|height=100]The recent Google Advanced Persistent Threat (APT) dialogue has been
hogging the press for a week now, and each day reveals new (and often
conflicting) insight. As I mentioned on Thursdays blog – “Preemptive Protection” Isn’t – If You’re Battling APT’s
– this particular attack doesn’t represent some new shift in tactics.
It’s not the first APT in the world, in fact I’m pretty sure it’s not
Google’s first exposure to APT’s, and I’m certain it isn’t going to the
last. In fact I’d say its a safe bet to say that there are several
other equivalent APT successes currently operating within Google’s
networks waiting to be discovered. Such is the state of the threat.