390 posts
MS10-002 Exploit Constructor
As humans beings, we tend to be a bit lazy, at least in most of the cases. And cybercriminals are human beings, and therefore, lazy…
Blog Comment Spam Honeypot
One of the most common vectors for distributing malware nowadays is spamming blogs with comments pointing to malicious sites that host exploits, malware, rogue antiviruses…
Blog Comment Spam Honeypot
One of the most common vectors for distributing malware nowadays is spamming blogs with comments pointing to malicious sites that host exploits, malware, rogue antiviruses…
2009 Annual Report
2009 has officially came to a close and the outstanding trend of the last 12 months has been the prolific production of new malware: 25…
See how difficult the life of a tech support professional can be !
Posted by Ana Just for fun!! Tech Support for Dad by Tom Smith It had been a long ass work week, it had been a long…
Rogueware with new Ransomware Technologyâ„¢
The criminals behind Rogueware attacks are becoming increasingly aggressive in their approach to make money. We recently stumbled across a sample (Adware/TotalSecurity2009) which uses a…
Fake IRS Notifications
Fake IRS notification e-mails have been in circulation on the Internet over the past few weeks. We’ve monitored the situation closely and have observed 30…