How To Spot A Fake Facebook Account
...How do you manage your Facebook friends? Do you keep your list really tight and only include ‘active’ pals? Or do you accept everyone you’ve ever laid eyes on?... more…XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing
...These malware pose as legitimate Facebook or Chrome applications. They are distributed from polluted DNS domains that send a notification to an unknowing victim’s device. The malicious apps can steal... more…Facebook Flaws Exposed Friend Lists, Payment Card Data
...A researcher last year discovered some information disclosure vulnerabilities in Facebook that exposed users’ friend lists and partial payment card information. The social media giant patched one of the... more…Facebook Suspends Trump Campaign Data Firm Cambridge Analytica
...Facebook says it has suspended the account of Cambridge Analytica, the data analysis firm hired by Donald Trump’s 2016 presidential campaign, amid reports it harvested the profile information of... more…Fake Facebook Chat Verification Used for Spam
...Facebook users are once again the target of a malicious scheme—this time in the form of a notification about “Facebook Chat”. The spammed notification pretends to come from the... more…Facebook Security Chief Changes Role to Focus on Election Fraud
...was leaving Facebook in the wake of internal clashes over how to deal with the platform being used to spread misinformation. “Despite the rumors, I’m still fully engaged with my... more…The Current Web-Delivered Java 0day
...The Java 0day activity that we have been monitoring and preventing for almost the past week has been irresponsibly reported on other blogs, with early posts publicly linking... more…Java Runtime Environment 1.7 Zero-Day Exploit Delivers Backdoor
...to the new Java 7 classcom.sun.beans.finder.ClassFinder that allows the sun.awt.SunToolkit class to load, modify and execute the malicious code. This threat is composed of an HTML page with malicious JavaScript... more…GhostTeam Adware can Steal Facebook Credentials
...by Kevin Sun (Mobile Threat Analyst) We uncovered a total of 53 apps on Google Play that can steal Facebook accounts and surreptitiously push ads. Many of these apps,... more…Facebook Announces Security Flaw Found in “View As” Feature
...Another day, another Facebook story. In May, a Facebook Messenger malware named FacexWorm was utilized by cybercriminals to steal user passwords and mine for cryptocurrency. Later that same... more…Facebook Users: Here are Proactive Tips to Keep Your Data Safe
...with Facebook Lite. You might be wondering how exactly this happened. It appears that many user passwords for Facebook, Facebook Lite, and Instagram were stored in plaintext in an internal... more…Facebook as an Election Weapon, From Obama to Trump
...The use of Facebook data to target voters has triggered global outrage with the Cambridge Analytica scandal. But the concept is nothing new: Barack Obama made extensive use of... more…#DeleteFacebook: Do You Really Need To?
...were alarmed at the fake news allegations last year, the recent scandal with Cambridge Analytica has us genuinely spooked and now asking ourselves this question. The fact that Facebook allowed... more…Hacking Tools, Survey Scam Using SOPA Target Facebook Users
...hacking tool for the social networking site Facebook. When I checked, the file is supposedly capable of obtaining Facebook passwords. Based on our analysis of the setup file, it behaves... more…A Mysterious Java Exploit
...Last week Kahu Security blogged about Escalating Java Attacks. Kahu’s post dissects two Java exploits. The first exploit targets CVE-2012-0507, the latest Java vulnerability that’s been seen being exploited... more…Java Zero-Day Exploit In The Wild, Spreading Ransomware
...JAVAGROUND pes 2019 java phonki 320 240 Pes 2006 danload DAWNLOAD STICKMAN JAVA New multiplayer mobile whot for java phone lock gams dawnlod java game lone survivor Download zumma 320x240... more…Kam dál?
- The World Cup: spammers set their sights on goal
- Microsoft Internet Explorer CVE-2014-4059 Remote Memory Corruption Vulnerability
- Unix: A Game Changer in the Ransomware Landscape?
- Under 18s should get the right to remove themselves from the internet
- Mozilla adopts plain-vanilla password sign-in for Firefox sync
- Ghost Push malware evolves in Android app infection spree
- Network Hardware Replacement – May 26
- Windows Vista infection rates climb, says Microsoft
- Mobile Device Management Policy Best Practices
- Russian Words Used as Decoy in Lazarus-Linked Bank Attacks