When you ask IT professionals if they use cloud computing or software-as-a-service, most start by saying “no”. But if you ask some follow up questions, you will quickly find out about “that one application” that is a SaaS application.
Read entire article
An independent group of security researchers has announced that they will be releasing zero-day vulnerabilities, web application vulnerabilities, and proof-of-concept exploits for patched vulnerabilities throughout the month of September. Many high-profile vendors such as Adobe, Apple, Microsoft, and Mozilla are among those whose products will apparently have vulnerabilities revealed in the month. According to [...]
Timing is everything–especially if you’re trying to spread malware. Last week, the developers of the popular Twitter application Tweetdeck notified users that due to changes in the supported authentication protocols by Twitter, users of older versions would have to upgrade. Naturally, cybercriminals latched onto this bit of news and sent out their own tweets [...]
Despite the consistent media exposure that FAKEAV malware receives, it has always been business-as-usual for the FAKEAV proponents. To find out why the notorious malware persists, Trend Micro researchers looked into three important aspects. These include: 1) social engineering techniques; 2) FAKEAV technology; and 3) the FAKEAV business itself. Social Engineering Social engineering is a [...]
Over the weekend, Microsoft issued a new security advisory which covered a vulnerability in how Windows handles DLL files. The attack scenario would go this way: a vulnerable application would be used to open a file. The opened file can be a perfectly legitimate file; however the malicious file must be located in the same [...]