Usuarios de Dropbox son blanco de estafa de phishing

Fake Dropbox login page attempts to steal credentials for popular email services.

Página falsa de acceso a Dropbox intenta robar credenciales de los usuarios de este servicio y de algunos de correo electrónico.

Availability of SHA-2 Hashing Algorithm for Windows 7 and Windows Server 2008 R2 – Version: 2.0

Revision Note: V2.0 (October 17, 2014): Removed Download Center links for Microsoft security update 2949927. Microsoft recommends that customers experiencing issues uninstall this update. Microsoft is investigating behavior associated with this update,…

2949927 – Availability of SHA-2 Hashing Algorithm for Windows 7 and Windows Server 2008 R2 – Version: 2.0

Revision Note: V2.0 (October 17, 2014): Removed Download Center links for Microsoft security update 2949927. Microsoft recommends that customers experiencing issues uninstall this update. Microsoft is investigating behavior associated with this update,…

???????????????? Hidden Lynx ?????????

      No Comments on ???????????????? Hidden Lynx ?????????

業界横断的な共同作戦により、Hidden Lynx APT グループによって利用されている Hikit マルウェアに大きな打撃を与えました。

Ebola scams spread faster than actual disease in panic-striken U.S.

Cybercrooks use popular stories in the news to deceive people into giving up confidential information. The dreaded disease Ebola that is spreading rapidly throughout West Africa made landfall in the US recently, and since then many news agencies have sensationalized the “outbreak” with constant coverage. Panic has grown as politicians raise the public’s fears and […]

Ebola scams spread faster than actual disease in panic-striken U.S.

Cybercrooks use popular stories in the news to deceive people into giving up confidential information. The dreaded disease Ebola that is spreading rapidly throughout West Africa made landfall in the US recently, and since then many news agencies have sensationalized the “outbreak” with constant coverage. Panic has grown as politicians raise the public’s fears and […]

Poodle: Vulnerability in old version of SSL represents new threat

New vulnerability in SSL 3.0 can allow attackers to extract data from supposedly secure connections.

New vulnerability in SSL 3.0 can allow attackers to extract data from supposedly secure connec…