Quantcast
Channel: Webroot Threat Blog » Search engines
Browsing all 12 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Blackhat SEO of Google Images Links to Rogue AV

By Andrew Brandt Yesterday, a few of the Threat Research folks and I had a little fun playing with a hack that had, for one day at least, pretty much decimated Google’s Image Search feature. One...

View Article



Image may be NSFW.
Clik here to view.

New Rogue Is Actually Five Rogues in One

By Andrew Brandt For years, the makers of those snake oil security programs we call Rogue Security Products have spent considerable effort making up new names, developing unique graphic design...

View Article

Image may be NSFW.
Clik here to view.

Five Reasons You Should Always “Stop. Think. Connect.”

By Andrew Brandt Today’s the official kickoff for National Cyber Security Awareness Month, and the organizations supporting the event, including the National Cyber Security Alliance, the Anti-Phishing...

View Article

Image may be NSFW.
Clik here to view.

With Great Power Comes Great Responsibility

By Ian Moyse, EMEA Channel Director The cloud delivery model gives vendors a great amount of power. It is easier to create, deploy, maintain and enhance a service than it has been at any other point in...

View Article

Image may be NSFW.
Clik here to view.

Shorty Worm Spams Links, Hijacks Browsers

By Andrew Brandt & Grayson Milbourne A novel worm we’re calling Worm-IM-Shorty appears to be winding its way through Facebook and some instant messaging services, with its come-on disguised as a...

View Article


Image may be NSFW.
Clik here to view.

Spammed YouTube Comments Promote Adware – Successfully

(Update, July 11, 2011:  On May 25, 2011, we were contacted by representatives of Future Ads, LLC, the parent company of both Playsushi and Gamevance.  Future Ads informed us that they, too, had been...

View Article

Image may be NSFW.
Clik here to view.

Malware Load Points Raise the Complexity Bar

By Andrew Brandt When malware ends up on an infected machine, one of the first things it will do is to ensure that it will start up again after the victim reboots their computer. For a criminal it...

View Article

Image may be NSFW.
Clik here to view.

Phishers Cast Their Nets in the Social Media Pool

By Ian Moyse, EMEA Channel Director It can seem at times that the only people who like change are Internet attackers. And they don’t just like it—they need it. Technology’s rapid changes give...

View Article


Image may be NSFW.
Clik here to view.

Outdated Operating System? This BlackHole Exploit Kit has you in its sights

By Mike Johnson Several weeks back, I was presented with a group of snapshots from an active BlackHole Exploit Kit 1.2 Control Panel. As with other toolkits I’ve seen in the wild, this one has all the...

View Article


Image may be NSFW.
Clik here to view.

Webroot’s Threat Blog Most Popular Posts for 2012

By Dancho Danchev It’s that time of the year! The moment when we look back, and reflect on Webroot’s Threat Blog most popular content for 2012. Which are this year’s most popular posts? What...

View Article

Image may be NSFW.
Clik here to view.

How fraudulent blackhat SEO monetizers apply Quality Assurance (QA) to their...

By Dancho Danchev How are cybercriminals most commonly abusing legitimate Web traffic? On the majority of occasions, some will either directly embed malicious iFrames on as many legitimate Web sites as...

View Article

Cybercrime Trends 2013 – Year in Review

It’s that time of the year! The moment when we reflect back on the cybercrime tactics, techniques and procedures (TTPs) that shaped 2013, in order to constructively speculate on what’s to come for 2014...

View Article
Browsing all 12 articles
Browse latest View live




Latest Images