Secure List feed for B2B

Syndicate content Securelist / All Updates
Updated: 14 hours 1 min ago

Blog: CODE BLUE in Tokyo

Mon, 03/03/2014 - 04:37
On February 17th (MON) - 18th (TUE), 2014 we were at an event in Tokyo called “CODE BLUE”, a new international information security conference ( originating from Japan.

Blog: The Future of Bitcoin After the Mt. Gox Incident

Fri, 02/28/2014 - 09:00
No doubt it's been a crazy week for anyone even remotely interested in Bitcoin. Mt. Gox, once the largest Bitcoin marketplace out there, has shut down, putting a bitter end to an almost month-long situation in which all withdrawals were halted because of technical issues. As customers were unable to move their funds out from Mt. Gox, the world's most famous exchange essentially became isolated from the rest of the Bitcoin ecosystem, making the Bitcoin price traded on Mt. Gox plummet to as low as $100 for 1 BTC before the exchange went completely offline.

Analysis: Spam report: January 2014

Thu, 02/27/2014 - 07:00
January saw spammers switch their attention from Christmas and New Year to St. Valentine’s Day. English- and Russian-language mass mailings offering video surveillance systems were yet another popular trend in January.

Blog: The first Tor Trojan for Android

Tue, 02/25/2014 - 06:00

Analysis: Mobile Malware Evolution: 2013

Mon, 02/24/2014 - 04:00
The mobile malware sector is growing rapidly both technologically and structurally. It is safe to say that today’s cybercriminal is no longer a lone hacker but part of a serious business operation.

Blog: Virtual bitcoins vs hard cash

Thu, 02/20/2014 - 08:45

Blog: Absolute Computrace: Frequently Asked Questions

Thu, 02/13/2014 - 15:32

In response to numerous requests for comments and clarifications after our presentation at the Kaspersky Security Analyst Summit 2014, we have created this FAQ with some answers to the most commonly asked questions.

Analysis: Absolute Computrace Revisited

Wed, 02/12/2014 - 06:00
The curent report is a return to the problem of security mechanisms implemented in modern anti-theft technologies that reside in firmware and PC BIOS of commonly used laptops and some of desktops.

Blog: The Careto/Mask APT: Frequently Asked Questions

Mon, 02/10/2014 - 14:46
The Mask is an advanced threat actor that has been involved in cyber-espionage operations since at least 2007.

Blog: Encrypted Java Archive Trojan bankers from Brazil

Thu, 02/06/2014 - 10:44
New technique used by Brazilian cybercriminals: Substitution cipher in Jar trojan bankers sent via email and joined by social engineering of course.

Blog: Largest Website in Sweden Spreading Malicious Code

Thu, 02/06/2014 - 06:21
The largest website in Sweden spreads malicious code.

Blog: Scammers heading to the Olympics

Thu, 02/06/2014 - 06:00

Blog: CVE-2014-0497 – a 0-day vulnerability

Wed, 02/05/2014 - 11:15

A short while ago, we came across a set of similar SWF exploits and were unable to determine which vulnerability they exploited.