Please turn on your JavaScript for this page to function normally.
Lenovo’s download portal found serving Bredolab Trojan

Lenovo’s driver download portal was discovered to be compromised and was found serving malware this weekend. A hidden iframe inserted in the page was redirecting users …

When Twitter resets your password

Recently, Twitter issued the following tweet on their @safety account: If you follow the link, you will be given information about the Twitter modus operandi when it comes to …

HTML files redirect users to malicious sites, evade mail server antivirus

Facebook, Twitter and Skype are Internet behemoths, counting hundreds of millions users each, so it is not surprising that many malicious email campaigns masquerade as …

Zbot Trojan delivery via fake Pentagon emails

Attention-piquing malicious spam emails purportedly coming from the DHS, the Pentagon or the Transportation Security Administration have recently been spotted by Sophos. With …

Next-generation Trojan plunders East European bank accounts

Russian and Ukrainian banks have been lately trying to stop the onslaught of BlackEnergy 2, a Trojan that manages to bypass the Java application that the customers use to …

Months-old Skype vulnerability exploited in the wild

A Skype flaw patched some 9 months ago with the new version (4.1.0.179) of the VoIP client has been spotted being exploited in the wild. According to M86 Security Labs, the …

Recently published and still unpatched Windows XP flaw exploited in the wild

Less than a week since the controversial release of details of a vulnerability in the Windows Help and Support Center function that affects Windows XP and Windows Server 2003 …

Twitter PDF exploit spam

As evidenced by these real-time results, various Twitter accounts have recently bombarded other users with a message saying “Wow, A marvelous Product” and …

Facebook “101 hottest women” clickjacking attack

Another clickjacking attack taking advantage of the “Like” button option has targeted Facebook users. The lure is very simple – follow the link to see the …

Automated social engineering PoC successful on Facebook and IRC

When it comes to social engineering attacks, one of the main challenges for the attackers is how to maximize the number of targets and the number of victims. In order to reach …

Backdoor in open source Linux IRC server

The public can be forgiven for thinking that Linux-based operating systems are somehow immune to attacks and compromises, since news of such an occurrence pops up …

0-day Windows flaw published by Google researcher

Tavis Ormandy – the well-known Google security researcher who discovered the feature/vulnerability in Java back in April and forced Sun to patch it up swiftly by …

Don't miss

Cybersecurity news