Mass iFrame injection attack now counts millions of compromised web pages
The recently discovered iFrame injection campaign rages on, as the number of compromised web pages goes from 90,000+ to over three million. Armorize researchers have been …
The recently discovered iFrame injection campaign rages on, as the number of compromised web pages goes from 90,000+ to over three million. Armorize researchers have been …
Metasploit is a free, open source penetration testing solution. Metasploit now ships with 698 exploit modules, 358 auxiliary modules, and 54 post modules. 11 new exploits, 1 …
Malware peddlers are targeting LinkedIn users with rather legitimate-looking messages supposedly coming from the social networking site: If the look of the message seems …
The analysis of a recent targeted attack against webmail users has led Trend Micro researchers to discover a vulnerability in Microsoft’s Hotmail webmail service that …
French security firm VUPEN has announced that its researchers have managed manufacture an exploit able to bypass Google Chrome’s sandbox, ASLR and DEP. It is precisely …
Osama bin Laden’s death is sure to be milked for all it’s worth by online spammers and scammers, and the latest instance of this also seems to be the latest …
A recently published paper titled “How to Shop for Free Online” presents the depressing results of a security analysis of some of the most popular online stores, …
By the end of 2010, the total number of Chinese Internet users reached 457 million. That means that even if scammers and hackers concentrate exclusively on that particular …
Streaming music service Spotify has been displaying malicious ads to users of their Free version. The ads lead to websites that used the Blackhole Exploit Kit to infect users …
A recent surge in attacks against a variety of sites that exploit a MHTML XSS vulnerability publicly disclosed in January – and which still hasn’t been patched by …
On the second day of the Pwn2Own contest held at the CanSecWest conference, iPhone and Blackberry devices have been successfully exploited, while the scheduled Android and …
Among the various exploit kits for sale out there it seems there is one that aspiring cyber crooks can use for free. Researchers from M86 have stumbled upon it by chance, and …