Home malicious
 

Keywords :   


Tag: malicious

Malicious browser extensions pose a serious threat and defenses are lacking

2013-09-26 23:33:48| InfoWorld: Top News

Although the number of malicious browser extensions has significantly increased in the past year many security products fail to offer adequate protection against them, while others are simply not designed to do so, according to a security researcher. Attackers have already used such extensions to perform click fraud by inserting rogue advertisements into websites or by hijacking search queries, but research has shown that this type of malware has the potential to cause much more damage.

Tags: are browser threat pose

 

New York Times Offline After 'Malicious' Hack

2013-08-28 04:35:07| PC Magazine Security Product Guide

The Syrian Electronic Army returned today, taking down the New York Times website and replacing it with a huge "Hacked by Syrian Electronic Army" banner.

Tags: times york offline york times

 
 

New York Times Offline After 'Malicious' Hack

2013-08-28 02:35:05| PC Magazine Software Product Guide

The Syrian Electronic Army returned today, taking down the New York Times website and replacing it with a huge "Hacked by Syrian Electronic Army" banner.

Tags: times york offline york times

 

Industrial control systems targeted by malicious attackers, research shows

2013-08-01 23:04:47| InfoWorld: Top News

Attackers are actively targeting Internet-connected ICSs (industrial control systems) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps. The ICS honeypot system, designed to attract attackers, was created by Kyle Wilhoit, a researcher from security firm Trend Micro. He shared some initial findings in March based on the system's original deployment in the U.S.

Tags: research control systems shows

 

Spam blizzards used to hide malicious activities

2013-07-03 16:11:30| InfoWorld: Top News

Digital desperadoes have begun hiding their larcenous activities behind blizzards of spam aimed at their victims' inboxes, a report released Tuesday by a cloud security provider notes. The technique, called Distributed Spam Distraction (DSD), began appearing early this year, AppRiver revealed in its Global Threat & Spamscape Report for the first half of 2013.

Tags: hide activities spam malicious

 

Sites : [1] [2] [3] [4] [5] [6] [7] [8] next »