OLX is the best Free Classifieds in India
OLX.IN is one of the best Free Classifieds websites on the internet ,if you don’t know what categorized Classifieds websites indicates then generally it is a website which details different ads according to groups.And whose ads if you ask,then the website details ads of individuals,people like you and me who want to offer their factors […] more…Microsoft stops email notification services
On Friday, Microsoft told security notification subscribers that the service would halt operations on July 1. From the email: As of July 1, 2014, due to changing governmental policies concerning the issuance of automated electronic messaging, Microsoft is suspending the use of email notifications that announce the following: Security bulletin advance notifications Security […] more…SPAM Hack Targets WordPress Core Install Directories
Do you run your website on WordPress? Have you checked the integrity of your core install lately for SPAM like “Google Pharmacy” stores or other fake stores? We have been tracking and analyzing a growing trend in SEO Spam (a.k.a., Search Engine Poisoning (SEP)) attacks in which thousands of compromised WordPress websites are being used […] more…Template Document Exploit Found in Several Targeted Attacks
The use of contextually-relevant emails is one of the most common social engineering tactics employed in targeted attacks. Emails still being the primary mode of business communications are often abused to deliver exploits to penetrate a network that consequently lead to other stages of a targeted attack cycle. In one of the targeted attacks we’re […] more…Attacks before system startup
A major objective pursued by malware writers when developing malicious code is to make it start as early as possible, enabling it to make key modifications to the operating system’s code and system drivers, such as installing hooks, before the antivirus product’s components initialize. As a result, malware and anti-malware products play cat and mouse […] more…Targeted Attack Methodologies for Cybercrime
We recently wrote about the difference between cybercrime and a cyber war, which narrows down to the attack’s intent. With the same intent of gaining information to use against targets, cybercriminals and attackers tend to stress less importance in their choice of “tools”, as these campaigns are all about who carries out the attack. Ultimately, a […] more…ANTIFULAI Targeted Attack Exploits Ichitaro Vulnerability
Targeted attacks are difficult to detect and mitigate by nature. We recently uncovered a targeted attack campaign we dubbed as “ANTIFULAI” that targets both government agencies and private industries in Japan. In our 2H 2013 Targeted Attack Trends report, we found that 80% of the analyzed cases of targeted attacks hit government institutions. Like many targeted attacks, ANTIFULAI uses […] more…Analyzing a Malicious iFrame – Following the Eval Trail
Over the last week, we’ve been working with some interesting malware injections. Developers and malware prevention professionals usually think of hidden iframes that deliver spam-seo or other malware as easy to spot. Take this injection, for example (Thanks to Sucuri team member, Rafael C., for the sample): This is not a traditional iframe src=’http://… code, […] more…‘Hack-proof’ drone revealed by Pentagon
The Pentagon’s research arm – the Defense Advance Research Project Agency (DARPA) – has unveiled a new drone which it claims to have built with secure software that can prevent control and navigation of the aircraft by hackers. more…‘Hack-proof’ drone revealed by Pentagon
The Pentagon’s research arm – the Defense Advance Research Project Agency (DARPA) – has unveiled a new drone which it claims to have built with secure software that can prevent control and navigation of the aircraft by hackers. more…Why Your Router Is A Security Risk & How To Fix It
The introduction of the home router was a great advancement in security for many owners. Before routers, most PC users relied only on a software firewall or, more often than not, ran no firewall at all. Routers with built-in firewalls have generally been a very good thing. Tags: Networking Security more…Wolfenstein: The New Order review: Satisfying, straightforward Nazi hunting
Wolfenstein: The New Order begins with an assault on the Baltic Sea stronghold of General Deathshead, the villain from 2009’s Wolfenstein. The Allies are losing the war, owing to advanced Nazi technology like huge tripod robots that shoot lightning bolts, giant robot dogs, and jet fighters protecting the base. The New Order establishes its sci-fi […] more…Targeted Attack Trends: A Look At 2H 2013
Targeted attacks are known to use zero-day exploits. However, old vulnerabilities are still frequently exploited. In fact, based on cases analyzed in the second half of 2013, the most exploited vulnerability in this time frame was CVE-2012-0158, a Microsoft Office vulnerability that was patched in April 2012. This shows how important applying the latest patches and security updates […] more…Analyzing CVE-2014-0515 – The Recent Flash Zero-Day
Last week, Adobe released an advisory disclosing a new zero-day vulnerability in Flash Player. Looking into the exploit code used in attacks targeting this vulnerability, we found several interesting ties to other vulnerabilities – not all of them for Flash Player, either. To explain this, we will discuss the highlights of how this exploit was performed. […] more…Analyzing the CVE-2014-0515 Exploit – The Recent Flash Zero-Day
Last week, Adobe released an advisory disclosing a new zero-day vulnerability in Flash Player. Looking into the exploit code used in attacks targeting this vulnerability, we found several interesting ties to other vulnerabilities – not all of them for Flash Player, either. To explain this, we will discuss the highlights of how this exploit was performed. […] more…Review: FireEye fights off multi-stage malware
FireEye takes a new approach to malware detection with its NX appliances. As this Clear Choice test shows, the FireEye device allows advanced malware to proceed but only onto virtual machines running inside the appliance. read more more…More information
- Top 10 tech stories of 2012: a busted IPO, spotlight on workers, titans in transition
- Turla Backdoor Controlled via Email Attachments
- Canada Privacy Watchdog Slams Police Use of Facial Recognition Tool
- HBO Offered ‘Bounty’ to Hackers: Report
- This PC monitor hack can manipulate pixels for malicious effect
- Router attack exploits UPnP and NSA malware to target PCs
- No keys to the kingdom: New single sign-on algorithm provides superior privacy
- U of Vermont Medical Center Continuing Cyber-Attack Recovery
- Cyber Skills Gap Quantified in Terms of Supply and Demand
- Blizzard Entertainment warns of password breach