May 01, 2013
For our May issue's "threat of the month," we focused on pdf.exe.zip files, an old-style email executable attachment attack.
April 01, 2013
April's "threat of the month" are Universal Plug and Play (UPnP) vulnerabilities, which allow attackers to execute arbitrary code.
March 01, 2013
Java zero-days are the "threat of the month," a vulnerability that allows remote code execution via browsers.
February 01, 2013
IE exploits, a zero-day vulnerability that affects various Internet Explorer versions, are February's "Threat of the month."
December 03, 2012
Our threat of the month for December are natural disasters, which result in the loss of confidentiality, integrity, and availability of sensitive information.
November 01, 2012
The "Threat of the Month" in our November issue are IE exploits.
October 01, 2012
This month's threat of the month is anti-virtualization malware which automatically activates on a system boot-up.
September 04, 2012
Unauthorized information disclosure via "paste" sites has been a common occurrence as a part of recent high-profile information security breaches.
July 02, 2012
Flame, aka Skywiper, is a sophisticated tool used to locate and steal data accessible from the infected computer. The malware uses multiple exploits to propagate and is highly configurable.
June 01, 2012
Also know as mass malware packs, crimeware packs are the "Threat of the Month" in the June issue of SC Magazine.
One of the most talked about threats this month is the infamous Ukash ransomware.
Threat of the month: Compromised embedded systems
Threat of the month: Unpatched applications
Threat of the month: Adobe vulnerabilities
Morto recently rose to fame as the first worm to leverage the Microsoft RDP protocol to propagate.
Be on the lookout for new mobile malware that leverages trojan, bot and "logic bomb" tricks.
June 01, 2011
The Sony PlayStation Network/Qriocity service breach of 77 million records contained a twist that makes it dangerous.
P2P DNS is the latest proposal for an alternative Domain Name System (DNS) service, one that strives to replace ICANN as the authority.
December 01, 2010
A new Firefox add-on can cause serious repercussions for users surfing the web on public Wi-Fi.
June 01, 2010
This threat refers to a plethora of password-stealing trojans targeting gamers.
Clampi (aka Ligats or Ilomo) is an information theft botnet. The malcode is a multicomponent tool that injects code into running processes, alters the PC's configuration and, once established, begins to harvest and send sensitive information from the PC to its handlers.
Conficker, which is both a worm and a bot, is one of the more sophisticated pieces of malicious software (malware) we have seen to date.