Researchers at RSA’s FraudAction Research Lab are reporting that the group behind the Neosploit malware infection tool kit may have thrown in the towel, which, if true, means an end to one of the badware industry’s most successful and high-profile business ventures thus far. It’s hard to pinpoint exactly when researchers first noticed the malware […]
HP is warning users of its OpenView Internet Services management package to be aware of a flaw in another product bundled with the software that could lead to denial-of-service attacks. The company issued an advisory Monday informing customers of a potentially serious vulnerability in Probe Builder, a technology made by European Performance Systems and included […]
Chinese malware distributors are hammering on a time-honored method for distributing their wares to unsuspecting users, forwarding an attack accompanying an anti-virus program, in this case one offered by industry giant Trend Micro. Trend Micro itself reported the attack, which is plugged as its own iClean malware removal client but harbors a backdoor-breeding Trojan. As […]
An interesting new angle emerged in the arena of data breach fallout last week, as the issue of just who should be forced to repay banks and other card issuers when incidents force them to distribute new cards to their customers took an interesting legal turn. Banks, credit unions and card companies themselves typically bear […]
Security researchers have identified a serious flaw in the RealPlayer multimedia software program that could be exploited remotely via malware attacks. According to an advisory posted by research firm Secunia on Friday, experts have isolated a “design error” related to the handling of frames in the program’s Shockwave Flash (SWF) files that could potentially be […]
With Black Hat only a few weeks away and the security industry gearing up for its yearly feast of cutting-edge research and exploit demonstrations, one of the trends most highly touted at the show for the last several years continues to flourish–as hackers and malware distributors rush to launch more of their attacks via so-called […]
A report published by researchers at the University of Michigan finds that a vast majority of online banking sites are open to some form of exploitation and subsequent data or asset theft. According to the report issued by Wolverine researcher Atul Prakash, a professor in U.M.’s Department of Electrical Engineering and Computer Science, and two […]
Illegal steroid sales are still all the rage online in the U.S.A. While sports officials on all levels continue their push to drive anabolic steroid use out of athletic competition, lawmakers have apparently been unable stop online sales of the illegal performance enhancers. A new report published by LegitScript.com, an online pharmacy verification service, and […]
Security researchers have reported a serious vulnerability in a handful of BEA Weblogic Server products that could be targeted in DoS attacks. Ranked by researchers at Secunia as “highly critical,” the fourth most serious rating of its five-level scale, the Weblogic vulnerability is related to a boundary error within the software’s Apache connector and could […]
After the emergence of the Trojan.JS.Encrypted.A attack last week — yet another in a long line of variants built off of the long-running Storm Worm code base — more activity has been reported along the same lines. In a blog posted on the Malware City information portal, which is backed by anti-virus vendor BitDefender, researcher […]