Wednesday, June 06, 2012

Summarizing ZDNet's Zero Day Posts for May


The following is a brief summary of all of my posts at ZDNet's Zero Day for May, 2012. You can subscribe to my personal RSS feedZero Day's main feed, or follow me on Twitter:

 
01. Is Mozilla's Firefox 'click-to-play' feature a sound response to drive-by malware attacks?
02. Rogue Firefox extension hijacks browser sessions
03. Spamvertised 'PayPal payment notifications' lead to client-side exploits and malware
04. Israeli Institute for National Security Studies compromised, serving Poison Ivy DIY malware
05. Researchers spot new Web malware exploitation kit
06. 2012 Olympics themed malware circulating in the wild
07. New ransomware impersonates the U.S Department of Justice
08. Localized ransomware variants circulating in the wild
09. Cybercriminals offer bogus fraud insurance services
10. Researchers spot fake mobile antivirus scanners on Google Play
11. The cyber security implications of Iran's government-backed antivirus software
12. Q&A of the week: 'The current state of the cyber warfare threat' featuring Jeffrey Carr
13. Researchers intercept Tatanga malware bypassing SMS based transaction authorization
14. New SpyEye plugin takes control of crimeware victims' webcam and microphone
15. Comcast phishing site contains valid TRUSTe seal
16. Q&A of the Week: 'The current state of the cybercrime ecosystem' featuring Mikko Hypponen

This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.

No comments:

Post a Comment