At least four groups are using malicious email attachments to deliver the W32.Extrat remote access Trojan to Colombian financial employees.Read More
Scammers copy information from real LinkedIn profiles to pose as recruiters and attract new connections.Read More
Tech support scammers may have bolstered their arsenal by using the Nuclear exploit kit to drop ransomware onto victims’ computers.
Revision Note: V1.0 (November 30, 2015): Advisory published.Summary: Microsoft is aware of unconstrained digital certificates from Dell Inc. for which the private keys were inadvertently disclosed. One of these unconstrained certificates could be used …
Uma análise sobre algumas das formas em que a sua nova Smart TV pode ser alvo de ataques cibernéticos.
Dell computers with the eDellRoot root certificate may allow attackers to sign SSL/TLS certificates as legitimate sources and can be vulnerable to man-in-the-middle attacks.Read More
A look at some of the possible ways your new smart TV could be the subject of cyberattacks.Read More
Cybercriminals spoof law enforcement officials in Dubai, Bahrain, Turkey, and Canada to send terror-alert spear-phishing emails containing Backdoor.Sockrat.Read More
Cybercriminals are looking for vulnerable installations of vBulletin to exploit. Keep them out by applying the latest patches.Read More
This month the vendor is releasing 12 bulletins covering a total of 49 vulnerabilities. 26 of this month’s issues are rated Critical.Read More