Blackhat SEO of Google Images Links to Rogue AV
By Andrew Brandt Yesterday, a few of the Threat Research folks and I had a little fun playing with a hack that had, for one day at least, pretty much decimated Google’s Image Search feature. One...
View ArticleNew Rogue Is Actually Five Rogues in One
By Andrew Brandt For years, the makers of those snake oil security programs we call Rogue Security Products have spent considerable effort making up new names, developing unique graphic design...
View ArticleFive Reasons You Should Always “Stop. Think. Connect.”
By Andrew Brandt Today’s the official kickoff for National Cyber Security Awareness Month, and the organizations supporting the event, including the National Cyber Security Alliance, the Anti-Phishing...
View ArticleWith Great Power Comes Great Responsibility
By Ian Moyse, EMEA Channel Director The cloud delivery model gives vendors a great amount of power. It is easier to create, deploy, maintain and enhance a service than it has been at any other point in...
View ArticleShorty Worm Spams Links, Hijacks Browsers
By Andrew Brandt & Grayson Milbourne A novel worm we’re calling Worm-IM-Shorty appears to be winding its way through Facebook and some instant messaging services, with its come-on disguised as a...
View ArticleSpammed YouTube Comments Promote Adware – Successfully
(Update, July 11, 2011: On May 25, 2011, we were contacted by representatives of Future Ads, LLC, the parent company of both Playsushi and Gamevance. Future Ads informed us that they, too, had been...
View ArticleMalware Load Points Raise the Complexity Bar
By Andrew Brandt When malware ends up on an infected machine, one of the first things it will do is to ensure that it will start up again after the victim reboots their computer. For a criminal it...
View ArticlePhishers Cast Their Nets in the Social Media Pool
By Ian Moyse, EMEA Channel Director It can seem at times that the only people who like change are Internet attackers. And they don’t just like it—they need it. Technology’s rapid changes give...
View ArticleOutdated Operating System? This BlackHole Exploit Kit has you in its sights
By Mike Johnson Several weeks back, I was presented with a group of snapshots from an active BlackHole Exploit Kit 1.2 Control Panel. As with other toolkits I’ve seen in the wild, this one has all the...
View ArticleWebroot’s Threat Blog Most Popular Posts for 2012
By Dancho Danchev It’s that time of the year! The moment when we look back, and reflect on Webroot’s Threat Blog most popular content for 2012. Which are this year’s most popular posts? What...
View ArticleHow fraudulent blackhat SEO monetizers apply Quality Assurance (QA) to their...
By Dancho Danchev How are cybercriminals most commonly abusing legitimate Web traffic? On the majority of occasions, some will either directly embed malicious iFrames on as many legitimate Web sites as...
View ArticleCybercrime Trends 2013 – Year in Review
It’s that time of the year! The moment when we reflect back on the cybercrime tactics, techniques and procedures (TTPs) that shaped 2013, in order to constructively speculate on what’s to come for 2014...
View Article
More Pages to Explore .....