Secure List feed for B2B

Syndicate content Securelist / All Updates
Updated: 16 hours 18 min ago

Analysis: IT threat evolution Q1 2014

Thu, 04/17/2014 - 07:00
According to KSN data, Kaspersky Lab products blocked a total of 1131000866 malicious attacks on computers and mobile devices in the first quarter of 2014.

Blog: SyScan 2014

Sun, 04/13/2014 - 07:18
In the first week of April 2014 we were at “The Symposium on Security for Asia Network" (SyScan) (, a “geeky” single-track conference located in Singapore.

Analysis: Financial cyber threats in 2013. Part 2: malware

Wed, 04/09/2014 - 06:00
Programs designed to steal e-money and financial data are among the most complicated types of malicious software out there today.

Blog: The omnipresent dad

Wed, 04/09/2014 - 05:00

Many websites show different text depending on where the user lives. For instance, home pages of some portals show you the news and weather of your region by default, because you are most likely to be interested in this kind of information first of all.

Blog: Adobe Updates April 2014

Tue, 04/08/2014 - 16:38
This month's Adobe Patch Tuesday revolves around Flash.

Blog: Microsoft Updates April 2014 - Office and Internet Explorer Critical Vulnerabilities

Tue, 04/08/2014 - 13:58
Absolutely all of the latest versions of Microsoft Word and some versions of Internet Explorer maintain critical vulnerabilities enabling remote code execution. Today, Microsoft releases two critical patches to close multiple vulnerabilities with each. Two important updates are released to address a batch file handling issue and another RCE hole in Microsoft Publisher. All of these are addressed with MS14-014 through MS14-018.

Blog: End of the line for Windows XP

Tue, 04/08/2014 - 04:50

Support for Windows XP is ending: after today there will be no new security updates, non-security hotfixes, free or paid assisted support options or online technical content updates.

Blog: Stealing from wallets

Fri, 04/04/2014 - 07:06
We’ve written several times about mobile malware that can send text messages to premium numbers or steal money from online bank accounts. We also know that cybercriminals are constantly looking for new ways of stealing money using mobile Trojans.

Blog: Garfield Garfield True, or the story behind Syrian Malware, .NET Trojans and Social Engineering

Thu, 04/03/2014 - 09:25
It's been a while since the last massive Internet outage took down Syria’s backbone network (AS29386).

Analysis: Financial cyber threats in 2013. Part 1: phishing

Wed, 04/02/2014 - 04:05
It has been quite a few years since cybercriminals started actively stealing money from user accounts at online stores, e-payment systems and online banking systems.

Blog: Caution: Malware pre-installed!

Mon, 03/31/2014 - 05:03
China’s leading TV station, CCTV, has a long-standing tradition of marking World Consumer Rights Day on March 15 with its ‘315 Evening Party’.

Analysis: BitGuard: a system of forced searches

Fri, 03/21/2014 - 06:00
In the past year, many users have been forced to deal with an extremely aggressive multi-component system BitGuard which is difficult to completely remove without professional assistance, although technically it comes with uninstallers.

Analysis: Spam report: February 2014

Thu, 03/20/2014 - 07:00
The share of spam in global email traffic decreased by 7.6 percentage points and averaged 65.7% in January. As forecasted, the drop in the share of spam was due to a lull early in January when there is less business activity and a large number of botnets are turned off.

Blog: Analysis of, Malware from the MtGox leak archive

Fri, 03/14/2014 - 09:47
A few days ago the personal blog and Reddit account of MTgox CEO, Mark Karpeles, were hacked

Blog: Agent.btz: a source of inspiration?

Wed, 03/12/2014 - 11:01
The past few days has seen an extensive discussion within the IT security industry about a cyberespionage campaign called Turla, aka Snake and Uroburos, which, according to G-DATA experts, may have been created by Russian special services.

Blog: Trust. Trust. Trust

Mon, 03/10/2014 - 16:31
Over the past week or so I've been to TrustyCon, Jeffrey Carr's town-hall debate on Privacy v National Security and Georgetown's conference on International Engagement on Cyber. All these conferences had trust as a major focal point.

Blog: RootedCON V

Mon, 03/10/2014 - 10:40

It was five years ago when a group of computer security enthusiasts decided to gather together and organize a security conference mainly for a Spanish-speaking audience.

Last week RootedCon celebrated its fifth birthday, gathering more than 1000 attendees. It is now firmly established as the most important security event in Spain.