July 17, 2015 Research Proves HTML5 Could Be Used to Hide Malware for Drive-By Download Attacks 2 min read - Researchers have shown how HTML5 could be used to hide malware through a series of obfuscation techniques that antivirus tools can't detect.
April 2, 2015 Security Researcher: eBay Vulnerabilities Could Have Led to Drive-By Attacks 2 min read - A pair of eBay vulnerabilities could have let cybercriminals hide malware in image files and direct URLs to harmful sites, according to a researcher.
Malware March 17, 2014 Killer Music: Hackers Exploit Media Player Vulnerabilities 3 min read - IBM research has found that cyber criminals are exploiting media player vulnerabilities to infect users' workstations with malware.
Malware February 20, 2014 Trusteer Apex Preempts New Point-of-Sale Malware JackPOS < 1 min read - As point-of-sale malwares continue to crop up, it is important to maintain the security of these systems to protect them.
Data Protection December 3, 2013 3 Ways to Steal Corporate Credentials 3 min read - Between key-logging malware, phishing schemes and e-commerce sites, there are many ways cyber criminals can steal corporate credentials and commit fraud.
Malware October 24, 2013 Protecting POS Systems From Dexter and Other Advanced Malware < 1 min read - Maintaining the security of POS systems is a growing concern: The Dexter malware has been found to target customers' payment information.
Advanced Threats May 2, 2013 Multistage Exploit Kits Boost Effective Malware Delivery 6 min read - Like ICBM missiles, multistage exploit kits first launch a nonthreatening stage and then use the second stage to inflict damage without raising suspicion.
Malware April 22, 2013 Twitter Malware: Spreading More Than Just Ideas 3 min read - With hundreds of millions of users, Twitter is one of the largest social networks, so it's no surprise that Twitter malware attacks are on the rise.
Malware June 2, 2011 LinkedIn Spam Emails Download Malware 4 min read - LinkedIn spam emails exploit users' tendency to follow links from social networks, then steal sensitive data from their computers.