Have you been bullied lately? Probably not, but to get you in the right mindset, think about your commute this morning, and that car that cut you off… Feel it now? That’s what it feels like for your kids when they get bullied, online, anonymously. Imagine that driver posts online about cutting you off, mocking Read more…
Contributor: Avdhoot Patil
Phishers have already shown interest in the violence that erupted recently in various parts of the Arab world. The phishing attack involving Syria is a good example. Phishers are now taking advantage of the political unrest i…
Did you know that while you innocently play games or browse Facebook on your smartphone or tablet, someone might be tracking your every move? Through a stream of data “leaked” by your mobile gadgets, cybercriminals can determine which direction you’re headed, how fast you’re walking and how long your strides are. Leaked data can even Read more…
The short answer is yes! You should be concerned. And even if you’re not concerned for yourself, with the Internet all of us are interconnected so cybercrime does not just affect one person or one group, but all of us. Imagine your body being targeted by 100 million viruses. That is exactly what cybercriminals are Read more…
リンクをクリックすると、図 2 のように感染した Web ページが開きます。この Web ページには、事件現場を収めた一連のビデオが表示されています。ページの最後には、読み込み途中のビデオがあり、Red 悪用ツールキットにリンクされています。これが、ユーザーのコンピュータ上でさまざまな脆弱性を悪用します。悪用に成功すると、boston.avi_______.exe というファイルのダウンロードするよう求めるポップアップが表示されます。
図 2. 感染した Web サイト
スパムメールメッセージには、以下のような件名が使われています。
件名: 2 Explosions at Boston Marathon(ボストンマラソンで 2 度の爆発)
件名: Explosion at Boston Marathon(ボストンマラソンで爆発)
件名: Explosion at the Boston Marathon(ボストンマラソンで爆発)
件名: Boston Explosion Caught on Video(ビデオがとらえたボストンマラソン爆発の瞬間)
Spam campaigns based on the Blackhole Exploit Kit send messages that contain links to compromised legitimate websites, which serve hidden iframes and redirections that exploit vulnerabilities across operating systems–from Android to Windows. Spam themes we have seen vary rapidly and are disguised to appear as legitimate messages from familiar services. Campaigns spoofing Facebook, LinkedIn, American Read more…
Spam campaigns based on the Blackhole Exploit Kit send messages that contain links to compromised legitimate websites, which serve hidden iframes and redirections that exploit vulnerabilities across operating systems–from Android to Windows. Spam themes we have seen vary rapidly and are disguised to appear as legitimate messages from familiar services. Campaigns spoofing Facebook, LinkedIn, American Read more…
Contributor: Christopher Mendes
On the afternoon of April 15, 2013, just when many people were on the cusp of conquering another personal milestone by completing the Boston Marathon, they were hit hard by an act of cowardice. Two bombs struck near…
Secure Hash Algorithm 256 (SHA-2 or SHA-256) support on Symantec Code Signing for Individuals and Symantec Code Signing for Organizations is available starting April 1st, 2013 on the following Symantec Code Signing platforms: Microsoft® Authenticod…