These days, when you scan Internet resources or take part in discussions, you inevitably come across materials and comments related to the use of cloud technology in antivirus protection. Read Full Article
Online gaming fraud: the evolution of the underground economy
Whatever type of game you take as an example – a card game, a board game, or a game of cops and robbers – attempts to cheat will be as old as the game itself. Read Full Article
Myrtus and Guava: the epidemic, the trends, the numbers
Over the last few days, Stuxnet has been covered extensively in the mass media. And it’s been covered differently by different sources. “Iran”, “Bushehr nuclear plant” and “cyber-weapon” are phrases which are already inexorably linked to Stuxnet. Read Full Article
Another live XSS vulnerability
Another live XSS vulnerability in Orkut affected more than 180,000 users in Brazil. Read Full Article
Google, Mozilla and now Opera… Who’s next?
There have been several reports about malware hosted on Mozilla and Google code servers. Now we also found malware hosted on My Opera community servers. Read Full Article
Spam Report: August 2010
The amount of spam detected in mail traffic averaged 82.6% in August 2010. A low of 79.4% was recorded on 2 August, with a peak value of 89.7% being reached on 7 August. Read Full Article
Live Twitter XSS
There is a new, actively exploited XSS on Twitter. Read Full Article
Targeted attacks: businesses under threat
As the subject of targeted attacks remains one of the industry’s most hotly discussed topics, and the waves of such attacks appear to be relentless, our experts, Kostin and Magnus, together with the team, decided to continue on with the theme. Read Full Article
iPhone Jailbreaking, Greenpois0n and SHAtter Trojans
With Apple fans waiting for the release of the Greenpois0n jailbreaking tool, the cybercriminals are exploiting the fuss with “Greenpois0n” trojans. Read Full Article
Pegel now in banners
We’re still monitoring Pegel, and we’ve come across something which piqued our interest: redirects to malicious websites hosting exploits weren’t only coming from infected legitimate sites, but also from flash ads on legitimate sites. Read Full Article