It’s that time again, where we look back at the year passed and assess how the threat landscape has changed—for better and for worse. The 2013 Verizon Data Breach Investigations Report (DBIR) reveals that last year was not only defined by the varied nature of cyberattacks, but also by the increased frequency of these incidents in general. Read more…
In the last few months, we have witnessed a rise in the number of cases of modified Web servers that inject malicious redirections into every website that it hosts. One example was the malicious Apache module (Linux.Chapro and Trojan.Apmod) that we blo…
The IC3 has been alerted to an increase in employment schemes pertaining to mystery/secret shopper positions. Many retail and service corporations hire evaluators to perform secret or random checks on themselves or their competitors, and fraudsters are capitalizing on this employment opportunity. Victims have reported to the IC3 they were… Read more »
One year ago, Avast launched avast! Free Antivirus for Mac, and celebrated with our first photo contest. The results were outstanding – we received 50,000 photos with “APPLE” as the topic, and our Facebook page became the 5th fastest growing page worldwide during the first week of the competition! Your enthusiatic reponse told us that: You are […]
I hope by now that you are aware that the Certificate Authority/Browser Forum has mandated that Certificate Authorities stop supporting 1024-bit key length RSA certificates for both SSL and code signing by the end of this year (2013). To learn more abo…
Part 1 – changes in the industry
The email and web security industry has seen many changes over the past years, especially in the cloud or SaaS market. Many vendors in this space started by offering email anti-malware and anti-spam services. They…
The 58th season of the UEFA Champions League is coming to an end with the final being played on May 25 at Wembley Stadium in London. Nowadays, cybercriminals are gaining a lot of interest in football, at least inasmuch as how to exploit interest in foo…
This year’s ISTR illustrates more clearly than ever before that the path of least secure resistance is going to be the path taken by hackers.
In years past, the profile of a hacker was an idle college kid or ‘script kiddie’, and accou…
Like all doting daughters, I adore my mother. However, I have to confess – I haven’t yet purchased her well-deserved Mother’s Day gift. But I am not short of gift suggestions, no way. In fact, I have an inbox full of emails offering me fabulous gift options from knives to nighties. So all is well, Read more…