Various business websites were recently hijacked to deliver crypto-ransomware to visitors. Why do attackers repeat the cycle of compromising legitimate websites via exploit kits, malware and vulnerable software?
The blog page of a leading UK media site, The Independent got compromised, potentially exposing users to ransomware. The blog, running on an out dated WordPress version, remains compromised
In a recent malvertising incident, Trend Micro threat analysts Dark Luo and Kenney Lu found that cybercriminals are using paid ads to victimize customers of a top cloud provider.
Cybercriminals are increasingly using malicious advertisements as a platform for spreading malware. Find out how they work how you can protect yourself from these online threats.
Online advertisements are increasingly being used by cybercriminals as a way to harvest info or install malicous code. Find out how malicious ads work and how you can avoid being a victim of such threats.
As news about the Ebola pandemic flooded the Internet, cybercriminals and have seized the opportunity to use the popularity of the topic as bait to lure unsuspecting victims to pages that could be used to steal their information and credentials.
Learn about soundsquatting, a domain squatting technique that takes advantage of homophones. See how it works, how it puts users at risk, and how to avoid unintentionally landing on malicious sites.
Soundsquatting is a domain-squatting technique that takes advantage of similar-sounding words, or homophones, to lead users to malicious websites. This research paper looks into how misheard (and not just misspelled) domain names can spell trouble for unsuspec