Drive-by downloads mean that you could get owned even when you are Just Visiting… Apple users – don’t let that happen to you! Source: Sophos
Drive-by downloads mean that you could get owned even when you are Just Visiting… Apple users – don’t let that happen to you! Source: Sophos
According to the old Chinese saying, the journey of a thousand miles begins with one step. And our path to revealing large-scale theft of VKontakte users’ personal data began with an email from a user asking us to take a look at a suspicious app. At first glance, the VK Music app only displayed legitimate […]
One of the first steps to ensure that your private information isn’t accessible is to understand the reasons that drive hackers and cybercriminals to do what they do – what are their motives? Politics? Money? Fame? Or is it merely the thrill of getting away with it? What influences their actions and their possible responses? […]
Microsoft releases six Security Bulletins today, three of them “critical” remote code execution, to fix almost thirty CVE-enumerated vulnerabilities. None of them are known to be publicly exploited, and only a couple are known to be publicly discussed. So, this round yet again demonstrates Microsoft’s continued commitment to proactive security software maintenance. A dozen of these CVE […]
Any attack that takes advantage of the “window of opportunity” produced by recently discovered vulnerabilities is called a Zero-Day attack. In other words, a rapid attack that is deployed by cybercriminals before security experts have been able to patch up the vulnerability… or even before they’ve heard of the attack. Any attack of this type […]
Some time ago while tracking Winnti group activity we came across a suspicious 64-bit sample. It was a standalone utility with the name HDD Rootkit for planting a bootkit on a computer. Once installed the bootkit infects the operating system with a backdoor at the early booting stage. The principles of this bootkit’s work, named […]
In the corporate environment, cyber-threats are becoming more and more sophisticated, security standards more complex, and budgets tighter and tighter. The world of technology in the workplace is no longer just restricted to servers, workstations, or email accounts, but rather we need to consider mobile devices and the culture of BYOD (Bring Your Own Device).We […]