• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Search

Search results

How Norton Keeps You "Shaded" From 'Silent, But Deadly' Threats

On May 19th, 2014 Blackshades made news headlines when the FBI and Europol announced that they had arrested dozens of individuals suspected of cybercriminal activity centered around the malware. Blackshades is a “silent, but deadly” threat, which unfortun ...
Blog Post
Author:
Solange_Desc Employee
Posted:
29-May-2014 | 12:02PM
Comments:
4
Kudos:
3

Adobe Flash Zero-Day Vulnerability Discovered

A new zero-day vulnerability has been discovered in Adobe Flash. Security researcher Kafeine reports that this  vulnerability is currently being exploited in the wild. The term zero-day refers to an unknown vulnerability or an exploit in a software progra ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
22-Jan-2015 | 11:03AM
Comments:
3
Kudos:
2

New Adobe Flash Zero-Day Exploit Discovered in Malvertisements

A new Adobe Zero-day exploit was discovered by Trend Micro on February 2nd, 2015. A Zero-day exploit is when there is an unpatched bug in a software program that allows hackers access to inject malware into your computer.   How Can Cybercriminals Infect M ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
02-Feb-2015 | 11:28AM
Comments:
2
Kudos:
5

New Internet Explorer Vulnerability Exposes Serious Phishing Hole

A new zero-day vulnerability in Internet Explorer could potentially allow attackers to steal log in credentials. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
04-Feb-2015 | 5:23PM
Kudos:
2

Symantec Partners With Europol In Ramnit Botnet Takedown

On February 25th, 2015, with the help of Symantec and other industry partners, Europol was able to seize servers used by the cybercriminal group behind the Ramnit Botnet. The group has been in operation for over five years, allowing the Ramnit threat to i ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
24-Feb-2015 | 3:23PM
Comments:
10
Kudos:
6

New "FREAK" Vulnerability Can Allow Attackers To Decrypt Encrypted Communications

A newly discovered vulnerability, dubbed, “FREAK”, that could allow attackers to intercept and decrypt encrypted traffic between browsers and web sites via a Man-in-the-Middle (MitM) attack, was discovered on March 3rd, 2015 by researchers. Once an attack ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
04-Mar-2015 | 3:30PM
Comments:
2
Kudos:
1

Be Still My Bleeding Heart: The Latest OpenSSL Vulnerability Is Nothing To Worry About

On March 19th, 2015, website developers who use OpenSSL learned of several bugs, including a severe bug that could allow hackers to render a webserver or website unavailable to users. What is OpenSSL? The “Open” in OpenSSL means that any developers can wo ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
20-Mar-2015 | 9:42AM
Comments:
1
Kudos:
2

New Mac Flaw Can Allow Attackers Access Once It Goes Into Sleep Mode

An independent security researcher recently discovered that some Apple Macs older than a year are susceptible to a nasty bug that would allow attackers to gain access to a computer once it wakes from “Sleep mode”. The bug affects Mac's sleep-mode ene ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
03-Jun-2015 | 6:19PM
Kudos:
1

A New Vulnerability in Apple's iOS Could Help Scammers Capture iCloud Passwords

Researchers discovered a new vulnerability in Apple’s mobile iOS platform that has the potential to trick users into divulging their passwords to scammers. A bug lurking in Apple’s iOS mail app on both iPhone and iPad, involved in handling HTML code will ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
11-Jun-2015 | 4:49PM
Kudos:
0

Team GhostShell Hacking Group is Back

A group of hackers known as Team GhostShell, claims to have hacked a multitude of organizations, including financial institutions, government agencies, political groups, law enforcement entities, and universities. Using a Twitter account, these cybercrimi ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
30-Jun-2015 | 12:11PM
Kudos:
1

HackingTeam Data Dump Leads to Adobe Zero Day Discovery

A new zero-day vulnerability in Adobe Flash Player was discovered via a cyberattack against the hackers-for-hire firm Hacking Team. A large amount of internal information leaked by the attackers contained data on the exploit, which could crash a computer ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
07-Jul-2015 | 10:51AM
Comments:
27
Kudos:
6

New Vulnerability in OpenSSL Could Allow Attackers to Intercept Secure Communications

A new weakness in OpenSSL could allow attackers to hijack secure communications by tricking a targeted computer into accepting invalid and untrusted SSL certificates as valid certificates. This could help facilitate man-in-the-middle (MITM) attacks, where ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
09-Jul-2015 | 4:36PM
Kudos:
2

Cyber Espionage Group Butterfly Targeting Major Corporations

Corporate espionage group Butterfly has compromised a series of major corporations over the past three years, targeting confidential information and intellectual property. Symantec has been monitoring this group and working with its victims to track the a ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
08-Jul-2015 | 2:01PM
Kudos:
2

UCLA Health Suffers Possible Medical Breach

Healthcare is Big Business for Cyber Criminals The healthcare industry is a prime target for attackers because healthcare data is a treasure trove to cybercriminals. By targeting a hospital’s records rather than just a credit card number or financial data ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
17-Jul-2015 | 5:40PM
Kudos:
1

Popular Photo Printing Website Suffers Possible Credit Card Data Breach

A popular photo printing website has announced that customer credit card data collected by a third party vendor may have been breached. As a precautionary measure, the company has temporarily disabled their website while the investigation into the breach ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
17-Jul-2015 | 3:32PM
Kudos:
2

Third Adobe Flash Exploit Found in Hacking Team Data Dump

Last week, the cyber attack against the hackers-for-hire firm Hacking Team, led to a theft of 400gb of data that exposed two Adobe Flash Player vulnerabilities.  In addition to those two vulnerabilities, another bug was exposed, making this the third Adob ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
13-Jul-2015 | 12:12PM
Kudos:
5

Researchers at Norton Discover a Number of “Porn Clicker” Malware Apps on the Google Play Store

The mobile threat landscape is rapidly evolving due to the fact that mobile phones are increasingly becoming an attractive and abundant target to cybercriminals. It seems that there are new threats evolving on a daily basis, and it is vital to be proactiv ...
Blog Post
Author:
robertreynolds Employee
Posted:
27-Jul-2015 | 5:06PM
Kudos:
3

Newly Discovered bug "Stagefright" Can Secretly Sneak Onto Android Phones Via MMS Text Messages

​A new, extremely dangerous flaw dubbed Stagefright, has been discovered within the Multimedia Text Message (MMS) capabilities on Android phones running OS 2.2 and later. This appears to affect about 95 percent of android phones. What Does Stagefright Do? ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
28-Jul-2015 | 3:26PM
Comments:
2
Kudos:
4

Windows 10 Ransomware Email Scam

Recently, a Windows 10 ransomware scam has been discovered in the form of phishing emails impersonating Microsoft. With new product releases come a slew of scams, vulnerabilities and anything else cybercriminals can use to capitalize on the buzz. Windows ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
03-Aug-2015 | 1:07PM
Comments:
1
Kudos:
4

Update Your Version of Firefox Now!

A new bug discovered in the Firefox web browser could allow attackers to gain access to files stored on a computer through malicious code injected into the browser’s built-in PDF viewer. Researchers first discovered attackers exploiting the weak spot in F ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
07-Aug-2015 | 11:02AM
Comments:
1
Kudos:
2

Researchers Create Thunderstrike 2- The Firmware Worm That Attacks Macs

Two researchers have designed a worm that can spread itself via the firmware of Apple OS X computers and peripherals, without the aid of connecting to the Internet. Firmware is software that resides on a chip in your device, and provides instructions to t ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
04-Aug-2015 | 10:51AM
Kudos:
2

Critical New Vulnerability Discovered on MacBooks

A critical new vulnerability that can be used to forcibly install software on MacBooks without the users’ consent or administrator password has been discovered on MacBooks running OS X Yosemite, version 10.10. To exploit this bug, attackers create malware ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
04-Aug-2015 | 3:32PM
Comments:
1
Kudos:
2

Watch Out for “Free” Movie and Television Scams During Big Events

One of the many wonderful gifts the Internet has given us is the ability to stream television, movies and sporting events, virtually anywhere and at any time. The onset of streaming media has opened up a world of legitimate video content providers, which ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
14-Aug-2015 | 11:58AM
Kudos:
2

How To Safely and Securely Use USB Memory Sticks

A malicious USB drive can install malware such as backdoor Trojans, information stealers and much more... ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
13-Aug-2015 | 3:17PM
Kudos:
3

Two New Vulnerabilities Found In Mac OS X

Symantec has confirmed the existence of two new vulnerabilities, which are security holes in software, in Mac OS X operating systems originally discovered by an Italian researcher. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
17-Aug-2015 | 12:51PM
Comments:
2
Kudos:
2

New Internet Explorer Vulnerability Found- Update Your Version Now

Microsoft has issued a critical security update for their web browser, Internet Explorer. This bug has already been seen in attacks involving the Evangelical Lutheran Church of Hong Kong’s website.  ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
19-Aug-2015 | 9:52AM
Kudos:
1

Over 225,000 Apple ID Credentials Stolen From Jailbroken iOS Devices

Cybercriminals have reportedly stolen over 225,000 Apple ID account credentials from jailbroken iOS devices, using a type of malware called, “Keyraider”.  The criminals have been using the stolen credentials to make in-app purchases with user accounts. Ke ...
Blog Post
Author:
Solange_Desc Employee
Posted:
31-Aug-2015 | 3:18PM
Kudos:
3

New Adult-themed Android Ransomware Variant Discovered

Researchers have discovered a new type of Android ransomware that takes advantage of a potentially embarrassing situation to extort the user into paying a ransom.  ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
04-Sep-2015 | 11:40AM
Kudos:
1

New Android Ransomware Variant of Simplocker Infects Tens of Thousands of Devices

Tens of thousands of Android devices have potentially been affected by a new variant of the Simplocker ransomware.  ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
02-Sep-2015 | 11:26AM
Kudos:
1

Bug in Apple’s iOS and OSX AirDrop Could Allow Malware to be Installed Silently

A vulnerability in Apple’s AirDrop feature has been discovered by Australian security researcher Mark Dowd.  AirDrop is an “over-the-air” file sharing service that uses Bluetooth and WiFi, and is built into iOS and Mac OS X products. AirDrop automatically ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
16-Sep-2015 | 12:59PM
Kudos:
0