.LNK Exploits - Shortcuts to InsecurityThe vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of...
Fake TweetDeck Updates Being Spread via Hacked Twitter AccountsCybercriminals are using hacked/compromised Twitter accounts to spread malicious links pointing to a fake update to...
In 2010, 25 percent of new worms have been specifically designed to spread through USB storage devices when connected to computers.These types of threats...
Boston based private equity and venture capital investment firm, Summit Partners today announced that it has invested $100 million for a minority stake in...
Variant of Popular ZeuS Malware Targets U.S. Military Around the WorldMalware created with the ZeuS toolkit is targeting members of the U.S. military with...
The second quarter Phishing Trends Report from Internet security provider IID (Internet Identity) indicates that there has been a significant switch in the tactics...
McAfee Threat Report - Malware Dominates The Threat LandscapeMcAfee has released its 'McAfee Threats Report: Second Quarter 2010' threat analysis report, showing that malware...
Cybercrime Trends for 2010 - 2010 Mid-Year Report from SonicWALLSonicWALL has released its mid-year 'top cybercrime trends for 2010' report which details the current...
Researchers at offensive hacking shop Synacktiv demonstrated successful exploit chains and were able to “fully compromise” Tesla’s newest electric car and take top billing...