The Anti-Phishing Working Group has asked its members to publicize the forthcoming Counter eCrime Operations Summit in Brazil, which I'm pleased to...
[Update: so far I have two votes for dumb. Maybe I'm giving this spammer too much credit, and it is a simple...
It has been a year since we last discussed fraudulent domain name registrar scams and we wanted to let people know that...
Greetings, friends and fiends. It's been a while since I've been able to blog: I've been trying out one of these vacation...
We have recently seen some reports that give some idea of the real size of the cybercrime problem. Recently Federal Deposit Insurance...
Ford Motor Company has recently announced that later this year it will be producing cars with built-in WiFi capabilities. Since 2008, the...
Let's consider the words of the song "I'll Never Fall In Love" by Burt Bacharach and Hal David: "What do you get...
While serving in the Marine Corps, one activity that I felt was effective in preparing both myself and my unit to be...
Perhaps you have seen the recent buzz around Google Buzz. The fact is that Google has decided that anything it knows about...
According to Cell-news.com, in 2007 over 850,000 Brits flushed their cell phones down the toilet. I’m sorry to report that there isn’t...
Recently Eric Schmidt, the CEO of Google, said in an interview “If you have something that you don’t want anyone to know,...
[Part 7 of an occasional series, updating a blog series I ran in early 2009 to reflect changes in the threat landscape. This...
No, I'm not talking about a newly-discovered and virulent OS X upconversion of SevenDust or AutoStart 9805. Mac Virus is a site...
Wow, I knew it was a problem, but the scope is mind-boggling. At least one of you out there is probably making...
Two new papers have gone up on the ESET White Papers page at http://www.eset.com/download/whitepapers.php. (Strictly speaking, they're not altogether new: they include...
At least as of this writing if you paste the following line into a Google search you’ll find something interesting… "2004 Honda...
In December 2009, due to miserable security practices, Rockyou.com suffered a data breach that exposed over 32 million user passwords which were...
A little over a week ago we received a comment in response to David Harley’s blog post that read as follows: InterNations...
SC Magazine recently reported a malicious application in Google’s Android online market store http://www.scmagazineus.com/malicious-apps-found-in-googles-android-online-store/article/161001/. Due to the highly open nature of Android...
[Part 4 of an occasional series, updating a blog series I ran in early 2009 to reflect changes in the threat landscape. This...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams