Threat of the month

Threat of the month: Universal Plug and Play vulnerabilities

Threat of the month: Universal Plug and Play vulnerabilities

April's "threat of the month" are Universal Plug and Play (UPnP) vulnerabilities, which allow attackers to execute arbitrary code.

Threat of the month: Java zero-day

Threat of the month: Java zero-day

Java zero-days are the "threat of the month," a vulnerability that allows remote code execution via browsers.

Threat of the month: IE exploits

Threat of the month: IE exploits

IE exploits, a zero-day vulnerability that affects various Internet Explorer versions, are February's "Threat of the month."

Threat of the month: Natural disasters

Threat of the month: Natural disasters

Our threat of the month for December are natural disasters, which result in the loss of confidentiality, integrity, and availability of sensitive information.

IE exploits are the "Threat of the Month"

IE exploits are the "Threat of the Month"

The "Threat of the Month" in our November issue are IE exploits.

Threat of the month: Anti-virtualization malware

Threat of the month: Anti-virtualization malware

This month's threat of the month is anti-virtualization malware which automatically activates on a system boot-up.

Threat of the month: Data disclosure via paste sites

Threat of the month: Data disclosure via paste sites

Unauthorized information disclosure via "paste" sites has been a common occurrence as a part of recent high-profile information security breaches.

The Flame virus is the "Threat of the Month"

The Flame virus is the "Threat of the Month"

Flame, aka Skywiper, is a sophisticated tool used to locate and steal data accessible from the infected computer. The malware uses multiple exploits to propagate and is highly configurable.

Crimeware packs are the "Threat of the Month"

Crimeware packs are the "Threat of the Month"

Also know as mass malware packs, crimeware packs are the "Threat of the Month" in the June issue of SC Magazine.

Threat of the month: Chrome exploit

Threat of the month: Chrome exploit

Threat of the month: Ukash ransomware

By

One of the most talked about threats this month is the infamous Ukash ransomware.

Threat of the month: Compromised embedded systems

Threat of the month: Compromised embedded systems

Threat of the month

Acrobat zero-days

Threat of the month: Unpatched applications

Threat of the month: Unpatched applications

Threat of the month: Adobe vulnerabilities

Threat of the month: Adobe vulnerabilities

Threat of the month: Morto worm

Morto recently rose to fame as the first worm to leverage the Microsoft RDP protocol to propagate.

Threat of the month

Perimeter exploit exposure

THREAT OF THE MONTH: Sun/Oracle Java SE

Sun/Oracle Java SE

Threat of the month: AndroidOS/Smspacem

Be on the lookout for new mobile malware that leverages trojan, bot and "logic bomb" tricks.

Threat of the month: PlayStation breach

Threat of the month: PlayStation breach

The Sony PlayStation Network/Qriocity service breach of 77 million records contained a twist that makes it dangerous.

Threat of the month: Flash zero-day

Threat of the month: Flash zero-day

Threat of the month: Hacktivism

Hacktivism

THREAT OF THE MONTH

IE zero-day

Threat of the month: P2P DNS

P2P DNS is the latest proposal for an alternative Domain Name System (DNS) service, one that strives to replace ICANN as the authority.

Threat of the month: Firesheep

Threat of the month: Firesheep

A new Firefox add-on can cause serious repercussions for users surfing the web on public Wi-Fi.

Threat of the month

Advanced malware threats

LNK/Exploit.CVE-2010-2568

LNK/Exploit.CVE-2010-2568

Threat of the month

MS Windows Help Center

Mass website compromise

Win32/PSW.OnLineGames

Win32/PSW.OnLineGames

This threat refers to a plethora of password-stealing trojans targeting gamers.

Win32/Hydraq

THREAT OF THE MONTH

THREAT OF THE MONTH

Adobe zero-day

Threat of the month

SEO attacks

Threat of the month: Clampi/Ligats

Clampi (aka Ligats or Ilomo) is an information theft botnet. The malcode is a multicomponent tool that injects code into running processes, alters the PC's configuration and, once established, begins to harvest and send sensitive information from the PC to its handlers.

Threat of the Month -- Conficker

Conficker, which is both a worm and a bot, is one of the more sophisticated pieces of malicious software (malware) we have seen to date.

Conficker worm

Drive-by pharming

Attack on IKEv2

Sign up for our newsletters

POLL