An Interview with Anonymous
Visit the main blog post (http://bit.ly/azgKeG) for up to the minute updates on the attack. Over the past few weeks I have been investigating the…
LinkedIn Spam Campaign
We’ve noticed a significant increase in realistic looking LinkedIn reminder spam e-mails over the past week. The e-mail appears to arrive from messages-noreply@bounce.linkedin.com on behalf…
Virus Bulletin 2010 – Vancouver
This week is taking place one of the main antivirus related conferences: Virus Bulletin. Hundreds of people, from different security companies, antivirus testers from around…
The Brazilian Army and Panda Security join forces to combat cyber-warfare
–Â Â Â This agreement will see Panda support the Brazilian Army in the professionalization of its operational agents in the fight against cyber terrorism, digital crime…
An instant with Google Instant
Google Instant highlights just how marvelous human beings are: we can search for something at the same time as we read the results, without our…
Rainbow worm took over Twitter, infecting millions of users
The worm exploits a vulnerability in Twitter, already patched, when used directly through the Web to propagate and provoke a series of unusual events User…
OnMouseOver XSS Vulnerability on Twitter
This morning we observed a Cross Site Scripting (XSS) attack taking place on Twitter. This particular vulnerability took advantage of the onmouseover function in JavaScript,…