From Tourist Information to Malware in one easy step…

This week BBC News and others reported that Gibraltar is joining another well known destination, Monmouth UK, by tagging locations around the country with printed 2 dimensional bar codes (QR Codes) which can be scanned by your smartphone to link you to Wikipedia articles. As a regular traveler, tourist, and conveyor of useless information, to Read more…

2757760 – Vulnerability in Internet Explorer Could Allow Remote Code Execution – Version: 2.0

Revision Note: V2.0 (September 21, 2012): Advisory updated to reflect publication of security bulletin.Summary: Microsoft has completed the investigation into public reports of this vulnerability. We have issued MS12-063 to address this issue. For more…

Vulnerability in Internet Explorer Could Allow Remote Code Execution – Version: 2.0

Severity Rating: Revision Note: V2.0 (September 21, 2012): Advisory updated to reflect publication of security bulletin.Summary: Microsoft has completed the investigation into public reports of this vulnerability. We have issued MS12-063 to address thi…

Microsoft Security Advisory (2757760): Vulnerability in Internet Explorer Could Allow Remote Code Execution – Version: 2.0

Severity Rating: Revision Note: V2.0 (September 21, 2012): Advisory updated to reflect publication of security bulletin.Summary: Microsoft has completed the investigation into public reports of this vulnerability. We have issued MS12-063 to address thi…

Microsoft Security Advisory (2757760): Vulnerability in Internet Explorer Could Allow Remote Code Execution – Version: 2.0

Revision Note: V2.0 (September 21, 2012): Advisory updated to reflect publication of security bulletin.
Summary: Microsoft has completed the investigation into public reports of this vulnerability. We have issued MS12-063 to ad…

Citadel Malware Continues to Deliver Reveton Ransomware in Attempts to Extort Money

The IC3 has been made aware of a new Citadel malware platform used to deliver ransomware named Reveton. The ransomware lures the victim to a drive-by download website, at which time the ransomware is installed on the user’s computer. Once installed, the computer freezes and a screen is displayed warning… Read more »