Watch out for this spam run taking place on Twitter: The spam spreading on compromised accounts are bundles of @ messages…
Month: February 2014
UMD Hacked, Over 300,000 Records Stolen
The University of Maryland (UMD) said it was the victim of a recent cyberattack, according to their statement released Wednesday. In…
Kindle Apps: Look Before You Leap
With school holidays in the UK slowly winding down (most likely with a cry of “Are they going back in yet”…
Adobe Flash Player Zero-Day: details and mitigation
Update (02/24/14): This exploit has been found in the wild already. It is blocked by Malwarebytes Anti-Exploit. In a very busy month…
Observing COM within Malicious Code
Occasionally, malware will take a different route to achieve its desired effects by using Component Object Model objects. Component Object Model,…
Compromised user accounts posted on Pastebin
Proof is a key component to hacking and some hackers have been taking to Pastebin to share their spoils. A recent…
No, Valve is NOT Collecting your Browsing History
If you play games on Steam, you’ll likely have fired up a title at some point which uses VAC – Valve…
“Hungry Bear Tears Woman to Pieces” Facebook Video Scam
Here’s a Facebook scam / fake video currently in circulation. Warning: a generally terrible standard of English used throughout: “Shocking Video:…
Hiding in plain sight: a story about a sneaky banking Trojan
The Zeus/Zbot Trojan is one the most notorious banking Trojans ever created; it’s so popular it gave birth to many offshoots…
Application Spams “My Top Followers” Posts To Tumblr Users
Way back in June 2013 a website was asking users of Tumblr to add a “HTML widget” (or, more likely, to…