je.st
news
Tag: malicious
Malicious browser extensions pose a serious threat and defenses are lacking
2013-09-26 23:33:48| InfoWorld: Top News
Although the number of malicious browser extensions has significantly increased in the past year many security products fail to offer adequate protection against them, while others are simply not designed to do so, according to a security researcher. Attackers have already used such extensions to perform click fraud by inserting rogue advertisements into websites or by hijacking search queries, but research has shown that this type of malware has the potential to cause much more damage.
New York Times Offline After 'Malicious' Hack
2013-08-28 04:35:07| PC Magazine Security Product Guide
The Syrian Electronic Army returned today, taking down the New York Times website and replacing it with a huge "Hacked by Syrian Electronic Army" banner.
Tags: times
york
offline
york times
New York Times Offline After 'Malicious' Hack
2013-08-28 02:35:05| PC Magazine Software Product Guide
The Syrian Electronic Army returned today, taking down the New York Times website and replacing it with a huge "Hacked by Syrian Electronic Army" banner.
Tags: times
york
offline
york times
Industrial control systems targeted by malicious attackers, research shows
2013-08-01 23:04:47| InfoWorld: Top News
Attackers are actively targeting Internet-connected ICSs (industrial control systems) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps. The ICS honeypot system, designed to attract attackers, was created by Kyle Wilhoit, a researcher from security firm Trend Micro. He shared some initial findings in March based on the system's original deployment in the U.S.
Tags: research
control
systems
shows
Spam blizzards used to hide malicious activities
2013-07-03 16:11:30| InfoWorld: Top News
Digital desperadoes have begun hiding their larcenous activities behind blizzards of spam aimed at their victims' inboxes, a report released Tuesday by a cloud security provider notes. The technique, called Distributed Spam Distraction (DSD), began appearing early this year, AppRiver revealed in its Global Threat & Spamscape Report for the first half of 2013.
Tags: hide
activities
spam
malicious