Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War

Yesterday, June 25, the Korean peninsula observed a series of cyberattacks coinciding with the 63rd anniversary of the start of the Korean War. While multiple attacks were conducted by multiple perpetrators, one of the distributed denial-of-service (DD…

Styx Exploit Kit Takes Advantage of Vulnerabilities

Web-based malware has increased over the last few years due to an abrupt spike in new exploit kits. These kits target vulnerabilities in popular applications and provide an effective way for cybercriminals to distribute malware. We have already discussed Red Kit, a common exploit kit. Recently McAfee Labs has observed an increase in the prevalence Read more…

Chrome Web Store Apps Now Automatically Scanned

Google has started to scan newly uploaded applications and extensions in its Chrome Web Store, similar to what they already do in the Android Play Market.
We have written about quite a few cases where malicious extensions were pushed on social network …

The Risk with Content Management Systems

The federal Office for Information Security in Germany (BSI) together with the “Fraunhofer SIT” and “]init[ AG” released a study on the risk with common content management systems (CMS) for websites. A CMS is typically used to a…

Are You Stressed Out About Passwords? Consider a Simple Option

Used correctly, passwords help keep your personal information safe, and if you’re like me, you probably have dozens (or in my case hundreds) of online accounts and mobile apps that require one. So it’s no surprise that people have adapted some coping strategies to make passwords memorable yet distinctive. The most common mistake consumers made, Read more…

Mobile Malware Plays Hide and Seek

      No Comments on Mobile Malware Plays Hide and Seek

Android/Obad.A is mobile malware that has been described as very complex. Truly it is one of the most complex we’ve seen because it: Uses Bluetooth to infect other Android devices Accepts commands from the attacker Hides from the Device Administration list This is a good collection of malicious activities for a modern piece of malware. Read more…

Mobile Malware Plays Hide and Seek

      No Comments on Mobile Malware Plays Hide and Seek

Android/Obad.A is mobile malware that has been described as very complex. Truly it is one of the most complex we’ve seen because it: Uses Bluetooth to infect other Android devices Accepts commands from the attacker Hides from the Device Administration list This is a good collection of malicious activities for a modern piece of malware. Read more…

Phishers Claim to Ensure Security for Digital Currency Users

Contributor: Avdhoot Patil
Digital currency, a form of electronic money, is a relatively new concept to the world. Many of these currencies have arisen during the past decade and digital currency in general has always been a subject of controversy. In …

10 Smart Tech Habits to Pass On To Your Kids

We teach them how to drive, how to cook, and how to find their way through tough situations. But parents today have added another task to their “essential parenting” list they must impart and that is: good tech habits. The role of technology in families is only growing. Tech has become a rather hefty line Read more…