• October 17, 2014
    Proof-of-concept malware that leverages flaws in USB drives has been made available. It was supposedly released to address the security issue, but the code could also be used and manipulated by bad guys. What do you need to know about BadUSB?
  • October 15, 2014
    Around a year after the massive Target data breach, two more well-known brands have confirmed that they have been breached through infected point-of-sale systems.
  • October 14, 2014
    Right on the heels of the Shellshock comes another threat that targets Mac users. Known as iWORM, this malware connects to a C&C server, allowing it to perform actions ranging from information theft and file downloads to configuration changes.
  • October 03, 2014
    Earlier this year, a website was compromised and used to spread online baking malware to approximately 7,000 victims in a span of two hours. This video describes how the site was compromised, the details of the attack, and the capabilities of the payloads.
  • October 01, 2014
    A look at the scope and scale of the threats that can be found on Twitter, including tweets that point to malicious URLs, phishing attacks.
  • September 26, 2014
    The evolution of PoS RAM Scraper malware, from their humble beginnings to the industrialized threats that they've become.
  • September 26, 2014
    Shellshock update: more attacks that exploit the Shellshock vulnerability have been detected, including exploit attempts in Brazil that seem to be targeting government institutions.
  • September 25, 2014
    The Bash vulnerability was reportedly already being exploited in the wild, only several hours after news first broke out. At least one sampled malware is capable of launching distributed denial-of-service (DDoS) attacks.
  • September 25, 2014
    While iOS users may not be as exposed to malicious apps, this does not mean that it is an impenetrable system. Beyond malware, risks and threats designed to affect Apple's mobile OS abound. Here some of the cases we've recorded.