More Accounts Compromised – Linkedin and eHarmony.
Hackers crack more than 60% of breached LinkedIn passwords. More than 60 percent of the unique hashed passwords accessed by hackers from a LinkedIn password database and posted online the week of June 4 were already cracked, according to security…
Microsoft ‘hardens’ Windows Update from Flame penetration.
Microsoft “hardened” its Windows Update system after researchers discovered the Flame virus can infect PCs by offering itself as an update masquerading as official Microsoft software. The worm infected computers in the Middle East and beyond for up to 2…
Conficker: Down but not out.
Conficker camouflages new Windows infections. Windows PCs infected with Conficker are more likely to be compromised by other malware because the worm masks secondary infections and makes those machines easier to exploit, a security expert found. That is the biggest…
Incessant Blackhole spam runs likely made by same group
An incessant string of spam e-mail campaigns leading to Web sites hosting the Blackhole exploit kit are hitting inboxes around the world in waves. The latest and most prominent ones consisted of the fake Facebook, LinkedIn, U.S. Postal Service, and…
Targeted attacks, mobile vulnerabilities on the rise
The findings of the latest “Internet Security Threat Report” from Symantec can be summed up as: “Attacks are rising, but the number of new vulnerabilities is decreasing.” This describes the threat landscape in 2011 in which hackers continued to exploit…
MasterCard, Visa confirm credit card data theft described as ‘massive’
Just when we thought the big credit card data breaches were over, atleast for a while (with Alberto Gonzalez put away after his scams at TJX, Heartland Payments and others) – along comes a new one reported today in www.Krebsonsecurity.com….
Critical Java hole being exploited on a large scale
Criminals are increasingly exploiting a critical hole in the Java Runtime Environment to infect computers with malicious code when users visit a specially crafted Web page. According to a security blogger, the reason for this increased activity is that the…
First time Office documents for MacOS are vulnerable.
New exploit uses old Office vulnerability for OS X malware delivery. Some malware groups have recently been found to be taking advantage of an old, patched vulnerability in Microsoft Office for OS X in an attempt to spread command-and-control malware…
Malware to increasingly abuse DNS
Security researchers have looked at ways to abuse the domain-name service (DNS) for years. Now, some researchers are warning the protocol may increasingly be used to help criminals communicate with compromised systems. At the RSA Conference in February, a senior…
Facebook scammers host Trojan horse extensions on Chrome Web Store.
Cybercriminals are uploading malicious Chrome browser extensions to the official Chrome Web Store and using them to hijack Facebook accounts, according to security researchers from Kaspersky Lab. The rogue extensions are advertised on Facebook by scammers and claim to allow…