Cybercrime Trends 2013 – Year in Review by Blog Staff | Dec 27, 2013 | Industry Intel, Threat Lab Reading Time: ~ 13 min.
A peek inside the booming underground market for stealth Bitcoin/Litecoin mining tools by Blog Staff | Dec 19, 2013 | Industry Intel, Threat Lab Reading Time: ~ 4 min.
Fake ‘WhatsApp Missed Voicemail’ themed emails lead to pharmaceutical scams by Blog Staff | Dec 18, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Cybercriminals offer fellow cybercriminals training in Operational Security (OPSEC) by Blog Staff | Dec 17, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities – part three by Blog Staff | Dec 16, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Tumblr under fire from DIY CAPTCHA-solving, proxies-supporting automatic account registration tools by Blog Staff | Dec 12, 2013 | Industry Intel, Threat Lab Reading Time: ~ 3 min.
How cybercriminals efficiently violate YouTube, Facebook, Twitter, Instagram, SoundCloud and Google+’s ToS by Blog Staff | Dec 11, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Malicious multi-hop iframe campaign affects thousands of Web sites, leads to a cocktail of client-side exploits – part two by Blog Staff | Dec 9, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Compromised legitimate Web sites expose users to malicious Java/Symbian/Android “Browser Updates” by Blog Staff | Dec 5, 2013 | Industry Intel, Threat Lab Reading Time: ~ < 1 min.
Commercial Windows-based compromised Web shells management application spotted in the wild by Blog Staff | Dec 4, 2013 | Industry Intel, Threat Lab Reading Time: ~ 3 min.
Cybercrime-friendly VPN service provider pitches itself as being ‘recommended by Edward Snowden’ by Blog Staff | Dec 3, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Fake ‘October’s Billing Address Code’ (BAC) form themed spam campaign leads to malware by Blog Staff | Nov 27, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.