Bogus Evernote alert leads to exploit kit

Monday, February 17th, 2014

Evernote users are being actively targeted with an email spam campaign that tries to trick them into following a malicious link. Sent from [email protected] and titled "Image has been sent", the email pretends to be a notification from Evernote that alerts the user to an image he or she needs to check out, ...

Exploit released for vulnerability targeted by Linksys router worm

Monday, February 17th, 2014

Technical details about a vulnerability in Linksys routers that's being exploited by a new worm have been released Sunday along with a proof-of-concept exploit and a larger than earlier expected list of potentially vulnerable device models. Last week, security researchers from the SANS Institute's Internet Storm Center identified a self-replicating malware ...

Java-based malware hits Windows, Mac and Linux

Wednesday, January 29th, 2014

Kaspersky Lab researchers have recently analysed a piece of malware that works well on all three of the most popular computer operating systems - the only thing that it needs to compromise targeted computers is for them to run a flawed version of Java. The Trojan is written wholly in Java, and exploits ...

Chrome exploit can secretly listen to oblivious users

Thursday, January 23rd, 2014

Google has been pushing hard to incorporate speech recognition features into Web apps. But a Chrome exploit that can secretly transcribe your conversations unless you're paying attention probably wasn't what the company had in mind. Whenever a website wants to access your microphone, Chrome requires permission. A dialog appears at the top of ...

Yahoo users exposed to malware attack

Sunday, January 5th, 2014

Yahoo.com visitors over the last few days may have been served with malware via the Yahoo ad network, according to a security firm in the Netherlands. Users clicking on some of the ads were redirected to sites armed with code that exploits vulnerabilities in Java and installs a variety of different ...