Security News

Exploit kits in 2015: What can we expect? (Help Net Security)
2015-03-16 15:00

Since 2006, when the earliest exploit kit (WebAttacker) was made available in the crimeware market, these hack toolkits have become one of the preferred ways for cybercrooks to deliver malware to unsu...

"Row hammering" - how to exploit a computer by overworking its memory (Naked Security)
2015-03-12 13:55

By overcooking your computer's memory, you may be able cause data corruption. But can you turn that into a deliberate security exploit? Google's Project Zero researchers say, "Yes!"

Angler exploit kit and domain shadowing: A deadly combination (Help Net Security)
2015-03-05 13:36

Attackers wielding the infamous Angler exploit kit are increasingly using hijacked registrant accounts to create huge amounts of subdomains for both redirecting victims and the destination pages hosti...