Search Results for
BEC
Anatomy of a Rogue Security Campaign
Reference for diagram: Step 1: Blue Shows the process at which the user will be directed to the infected website. Step 2: Red Shows the…
ICANN Terminates Contract with EstDomains
The Internet Corporation for Assigned Names and Numbers (ICANN) has terminated its contract with the widely criticized domain registrar, EstDomains. For those who don't know,…
As stock market drops malware rises
As the U.S. stock market indexes dramatically declined in September, cybercriminals began organizing their efforts to sustain profitability. While the stock market shows a sharp…
Facebook and MySpace's worm
PandaLabs has recently detected a new variant of the Boface family that affects the social networks Facebook and MySpace. In this case, the worm sends all the user's…
Barack Obama's Spam & Malware Campaign
Shortly after having known the results of the US presidencial elections, the cyber-crooks have used this topic to distribute malware in spam messages. One of…
Rogue mistakes!
As we have mentioned recently, the distribution of rogue antimalware programs has increased considerably and they have become a very widespread threat, even reaching Trojans,…
Exploits vs Antivirus – The Last Stand
Internet Security Suites fail to block exploits and do little to protect users against exploits, according to a recently released "test" [here] by Secunia, a…