This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Exploit kits comprised of ...
Law enforcement actions and a relative dearth of zero-day bugs appear to have contributed to a sharp decline in exploit kit activity in recent months. It's too soon, however, to say whether the ...
When we talk to people whose computers have been infected, they often ask how it happened. In a growing number of cases, they have been doing nothing more than reading a news website or browsing for ...
I recently had the opportunity to talk Bob Bales, CEO, and Roger Thompson, CTO of Atlanta-based Exploit Prevention Labs. I must admit – the call left me feeling a bit uneasy. I learned from them just ...
MILPITAS, Calif. – FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today announced several enhancements to its endpoint security solution designed to offer unparalleled protection ...
Threat analysts have uncovered yet a new campaign that uses the RIG Exploit Kit to deliver the RedLine stealer malware. Exploit kits (EKs) have dropped drastically in popularity as they targeted ...
Attackers are using compromised websites to exploit a new and currently unpatched vulnerability in Flash Player, a malware researcher has reported. The new exploit was observed in drive-by-download ...
Some websites running the e-commerce platform Magento appear to have been infected with code that directs victims to the Neutrino exploit kit. It’s not exactly clear how the Magento sites were ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results