Monday, February 17th, 2014
Evernote users are being actively targeted with an email spam campaign that tries to trick them into following a malicious link.
Sent from
[email protected] and titled "Image has been sent", the email pretends to be a notification from Evernote that alerts the user to an image he or she needs to check out, ...
Posted in Internet, Security | No Comments
Monday, February 17th, 2014
Technical details about a vulnerability in Linksys routers that's being exploited by a new worm have been released Sunday along with a proof-of-concept exploit and a larger than earlier expected list of potentially vulnerable device models.
Last week, security researchers from the SANS Institute's Internet Storm Center identified a self-replicating malware ...
Posted in Hardware, Internet, Networking, Security | No Comments
Wednesday, January 29th, 2014
Kaspersky Lab researchers have recently analysed a piece of malware that works well on all three of the most popular computer operating systems - the only thing that it needs to compromise targeted computers is for them to run a flawed version of Java.
The Trojan is written wholly in Java, and exploits ...
Posted in Internet, Linux, Security, Windows | No Comments
Thursday, January 23rd, 2014
Google has been pushing hard to incorporate speech recognition features into Web apps. But a Chrome exploit that can secretly transcribe your conversations unless you're paying attention probably wasn't what the company had in mind.
Whenever a website wants to access your microphone, Chrome requires permission. A dialog appears at the top of ...
Posted in Internet, Privacy, Security | No Comments
Sunday, January 5th, 2014
Yahoo.com visitors over the last few days may have been served with malware via the Yahoo ad network, according to a security firm in the Netherlands. Users clicking on some of the ads were redirected to sites armed with code that exploits vulnerabilities in Java and installs a variety of different ...
Posted in Internet, Privacy, Security | No Comments