Update (05/21/2014): As previously suspected, other reports also support that CVE-2013-2729 is being used in malicious PDFs). Email remains a widely used infection…
Tag: exploit
A Penguin in XP’s Clothing
With the retirement of support for Windows XP, a large number of users are left in the position to either upgrade…
Popular adult site beeg[dot]com pushes malware
Update (03/21/2014): We received an email from beeg[dot]com’s owner: Subject: We need you urgent attention. Your last blog post hey guys, we…
CanSecWest day 3 Recap
This was the third and final day of the CanSecWest conference. To keep with our weather theme, yes, it did finally…
WhatsApp Hack Promises Messages, Delivers PUPs
What is it? A site claiming to offer up a tool designed to grab WhatsApp user messages. What does it do?…
Adobe Flash Player Zero-Day: details and mitigation
Update (02/24/14): This exploit has been found in the wild already. It is blocked by Malwarebytes Anti-Exploit. In a very busy month…
New Internet Explorer 10 zero-day used in targeted attacks
A new and currently unpatched flaw affecting Internet Explorer 10 (CVE-2014-0322) has been discovered on some highly targeted websites, indicating a…
Vulnerability Found in Samsung’s Galaxy S4
Researchers from Ben-Gurion University’s security lab (BGU) discovered a vulnerability in the Samsung Galaxy S4’s Knox architecture. If exploited, the attacker…
A Tumblr of trouble
Like many other social networking sites, Tumblr is a hot spot for malware infections, spam and other security issues. I thought…
Bug bounties and the price of security
In a recent article on the NSS Security blog, Stefan Frei discusses a potential standard for bug bounty programs and how it could…