Recently, the website “Hoax Slayer” pointed us to a spammed email message that warns users of a Tsunami and encourages them to click on a link to watch a video. The article, which the cybercriminals made to look like it came from “news.com.au”, claims that experts have predicted that a Tsunami will hit Australia on [...]
A zero-day vulnerability in yahoo.com that lets attackers hijack Yahoo! email accounts and redirect users to malicious Web sites offers a fascinating glimpse into the underground market for large-scale exploits. The exploit, being sold for $700 by an Egyptian hacker on an exclusive cybercrime forum, targets a “cross-site scripting” (XSS) weakness in yahoo.com that lets [...]
Ransomware has become major concern among users, particularly those variants that mimic law enforcement agencies like the FBI (known as police ransomware). Certain features have also been incorporated into the threat recently, such as an audio file and just now, fake digital certificates. We encountered two samples bearing the same fake digital signature, which Trend [...]
Here is a carefully assembled list of the most common – and annoying – marketing mistakes made by cloud (or non-cloud) companies. 1) Cloudwashing – treat all cloud stuff the same. Do you mean PaaS, SaaS, IaaS, or private cloud…. or just virtualization? Or maybe your kid’s aquarium service that has a web page with [...]
Some people are so used to being bombarded with bogus and malicious emails claiming to come from the likes of Facebook, LinkedIn and Twitter that they don't believe the legitimate communications they receive any more.
A hacker claims he was disclosing a security flaw responsibly.
But IRC transcripts show that the Goatse hacking group was instead musing about shorting AT&T stock, discussed selling 120,000 email addresses to spammers, and never told AT&T about the vulnerability in the first place.