Blogs
- 29 Juli 2014live casino online researchers found two critical vulnerabilties in Alipay, an app payment system popular in China. When exploited, the vulnerabilities allow attackers to manipulate app displays or create phishing pages to get data.
- 29 Juli 2014Transformers, 22 Jump Street, Godzilla - these are some of the movie titles that get our attention. Cybercriminals also use these titles to lure users into traps built into sites like Tumblr and WordPress.
- 28 Juli 2014Popular movies and sporting events are popular bait used by cybercriminals for phishing scams. Learn how you can tell whether a page is a phishing page or not.
- 24 Juli 2014The growth in spam volume during the first of half of 2014 can be attributed to the prevalence of threats that use spam as an infection vector. This include known threats like DOWNAD, UPATRE, and ZEUS/ZBOT.
- 24 Juli 2014The “open“ nature of Android allows many app developers to explore the potential of the system. However, the very “open“ nature of Android could also allow abuse and exploits. live casino online analyzes some of these risks.
- 23 Juli 2014Smart grids are power grids with digital capabilities. Given the widespread control smart grids hold over public utilities, attackers are likely to target them to gain power or extort money.
- 22 Juli 2014By targeting session tokens sent via SMS in an elaborate fashion, a cybercriminal gang is able to intercept two-factor authentication and get your banking credentials. This attack is dubbed Operation Emmental.
- 21 Juli 2014Smart meters are already installed in many cities across the globe. As more homes are installed with smart meters, homeowners should be aware of the possible risks they may bring.
- 18 Juli 2014Hours after the fateful crash of Malaysia Airlines 777, suspicious .tk links on Twitter posts led to spyware downloads, while “actual footage“ posts on Facebook pointed to adware.