Proving once again that rogue AV threats are as ubiquitous as any brand of malware campaign out there these days, the phony security programs have now made the leap to Google Image search results. Rogue AV attackers are sprinkling their wares throughout search results for popular terms including the names of actresses on popular TV […]
Users of social networking sites such as Facebook have been sitting directly in attackers’ crosshairs for several years now, and the threats and social engineering schemes used to victimize such individuals continue to mature. In a new twist, as Facebook and other sites attempt to be more responsive in hunting down and eradicating attacks flowing […]
Sometimes it’s hard not to miss our old friends, even when they’re something of a gigantic pain, right? At least that’s how I hope my friends feel. Researchers noted this week that the buzzworthy Trojan.Hydraq campaign that was used to hack Google and some other tech giants employed some of the same techniques used by […]
Security researchers continue to peel back the layers on the Trojan.Hydraq aka Operation Aurora attacks first reported publicly earlier this month, and the techniques employed by the threat to stay alive on infected machines were apparently neither cutting-edge, nor particularly sophisticated. According to researchers with Symantec — who’ve published a series of blogs examining various […]
The other day I dropped my shiny new iPhone 3GS for the first time since acquiring it several weeks ago. My first reaction was to hop online and order the best carrying case I could find. (Sidenote: Why is that we typically only move to protect such possessions from harm after we’ve already scratched them? […]
As the Chinese government reconsiders its recent ban on individuals attempting to register its designated .cn domain names – in response to massive outcry over the newly implemented rules from its online population – they may have an unexpected constituency hoping that they do indeed reverse their course – spammers. Security researchers have tracked significant […]
In years past there’s been a lot written and said about the rise of mobile malware, but over the years there’s been a stunningly low number of actual attacks on wireless handheld devices compared to the level of dire prognostication. The main reason why the predicted attacks never truly materialized was based on a number […]
After several years of downward trending in the attempted use of illegal programs such as file sharing clients — which have long been a breeding ground for all manner of attacks based on their underground status — security researchers are noting a recent uptick in attempted of the applications. Perhaps driven by the lagging worldwide […]
Trojan attacks once again led the way in terms of the sheer volume of threats tracked by security researchers during the month of December. According to experts with Sunbelt Software, based on their month-long scanning efforts, the mix of attacks seen over the course of Dec. 2009 was very similar to what was observed during […]
We often give attackers credit for their ingenuity when they’re finding new ways to game people using social engineering, or more commonly when they’ve created some new form of malware threat to circumvent security defenses. But one of the skills being shown off of late by some savvy scammers is their ability to understand the […]