Please turn on your JavaScript for this page to function normally.
Blackhole outfitted with exploit for recently patched Java flaw

The exploit for the recently patched CVE-2013-0431 Java vulnerability has been added to the Blackhole exploit kit, Trend Micro researchers report. The fact was discovered …

New Java 0-day exploited in ongoing attacks

FireEye has detected yet another Java zero-day vulnerability being exploited in attacks in the wild. Affected updates are Java v1.6 Update 41 and Java v1.7 Update 15 (released …

Old school malware used for spying on European govts

Kaspersky Lab’s team of experts published a new research report that analyzed a series of security incidents involving the use of the recently discovered PDF exploit in …

Microsoft also victim of recent watering hole attack

Microsoft has followed in the steps of Twitter, Facebook and Apple, and has confirmed on Friday that it has recently experienced a security intrusion. “During our …

NBC website serving malware – stay away!

NBC’s website has been compromised, and is redirecting users to malicious sites, reports Dancho Danchev. According to HitmanPro, the website has been injected with …

Facebook employees ambushed by zero-day exploit

Facebook is the latest big company to admit that they have been targeted with a “sophisticated” attack. The attack was triggered when a small number of Facebook …

LA Times website redirected users to exploit kit for over six weeks

A sub-domain of Los Angeles Times’ website has been redirecting visitors to compromised websites hosting the latest version of the Blackhole exploit kit for over six …

Adobe Reader zero-day exploit spotted in the wild

Researchers form security firm FireEye have found in the wild a PDF file that exploits a new zero-day vulnerability in Adobe Reader. “Upon successful exploitation, it …

Children turning into malicious code developers

In a world filled with laptops, tablets and smartphones, today’s children become digitally fluent far earlier than previous generations. Now, AVG has found evidence that …

Fake Amazon Kindle receipt leads to persistent malware

Amazon customers buying e-books for their Kindle or other mobile devices should be careful with emails that seemingly containing receipts for their purchases, warns Webroot, …

Most exploit kits originated in Russia, say researchers

58 percent of the vulnerabilities targeted by the most popular exploit kits in Q4 were more than two years old and 70 percent of exploit kits reviewed were released or …

Dangerous remote Linksys 0-day root vulnerability discovered

DefenseCode researchers have uncovered a remote root access vulnerability in the default installation of Linksys routers. They contacted Cisco and shared a detailed …

Don't miss

Cybersecurity news