February 20, 2013 | BY
In May 2011 the European Union changed the law that covers the use of electronic communications networks to store information, e.g. using cookies, or gain access to information stored in the terminal equipment of a subscriber or user. One year later, in May 2012 the law was updated in the sense that implied consent was […]
February 18, 2013 | BY
For many years now, computer security conferences have been a common way for researchers, hackers, and security experts to meet and discuss the latest industry developments. In addition to the security talks, these conferences offer training courses, certifications, and other special challenges.
February 15, 2013 | BY
This week I am talking with Eric Freyssinet, head of a national cybercrime investigative unit in France. We discuss ransomware and cyber crime in general from a researcher/law enforcement point of view. There are several initiatives in place to educate end users about these threats and also how to get rid of them without forking […]
February 14, 2013 | BY
URGENT: A few days ago a new zero-day vulnerability in Adobe Reader had surfaced. Details below are on Adobe’s blog.
February 13, 2013 | BY
What is a text popup? A text popup is a link that opens a popup box containing advertisements, usually prompted by a mouse-over. Where do they come from? As a moderator on a few forums and as an amateur web-designer, I often get complaints from people asking me to remove the annoying text popups or […]
February 11, 2013 | BY
Exploit Kits are a serious cyber threat today, estimated to be responsible for the vast percentage of malware infections worldwide. Exploit kits distributed currently through both public and underground sources appeal to a wide range of audiences, from inexperienced hackers to seasoned “black hat” cybercriminals. Perhaps you or someone you know may have heard about […]
February 5, 2013 | BY
This article is meant to give you an overview of how sandboxes are used and why malware writers try to avoid their code to run on them. It will also list some methods that are in use to make malware sandbox-sensitive. Without going into much detail it will also give you an idea of the […]
February 4, 2013 | BY
Update (Feb 6th): The digital certificates have been revoked by DigiCert. Update (Feb 4th, 3:44 PM): Egnyte has promptly taken down the illicit account following our call. However, digital signature is still in use. In the past few days we have heard several stories about major corporations getting hacked and their security systems completely bypassed. If […]