Researchers at NGSSoftware have developed a hybrid attack capable of hiding itself within an image and intend to present details on the exploit at the Black Hat security conference next week. New and ...
The hundreds of government, military and research organizations targeted in a large-scale cyberespionage operation dubbed Red October were not only attacked using malicious Excel and Word documents as ...
Microsoft has warned of three flaws affecting its software, the most serious of which would allow an attacker to gain full control of a PC using Java applets. The warnings, issued Wednesday, are ...
The price of freedom, as they say, is eternal vigilance. A user called bitbully on the Bitcointalk Forums found himself 34 bitcoins poorer when he visited a site claiming to be a chat service ...
A new Web-based social engineering attack that relies on malicious Java applets attempts to install backdoors on Windows, Linux, and Mac computers, according to security researchers from antivirus ...
So far, the vulnerability has been leveraged via Internet Explorer, Chrome and Firefox, and the attackers have reportedly been installing a dropper (Dropper.MsPMs), as well as a piece of malware known ...
A new Web-based social engineering attack that relies on malicious Java applets attempts to install backdoors on Windows, Linux and Mac computers, according to security researchers from antivirus ...