Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1
Monday, January 06, 2014
Summarizing Webroot's Threat Blog Posts for December
The following is a brief summary of all of my posts at Webroot's Threat Blog for December, 2013. You can subscribe to Webroot's Threat Blog RSS Feed, or follow me on Twitter:
01. Cybercrime-friendly VPN service provider pitches itself as being ‘recommended by Edward Snowden’
02. Commercial Windows-based compromised Web shells management application spotted in the wild
03. Compromised legitimate Web sites expose users to malicious Java/Symbian/Android “Browser Updates”
04. Malicious multi-hop iframe campaign affects thousands of Web sites, leads to a cocktail of client-side exploits – part two
05. How cybercriminals efficiently violate YouTube, Facebook, Twitter, Instagram, SoundCloud and Google+’s ToS
06. Tumblr under fire from DIY CAPTCHA-solving, proxies-supporting automatic account registration tools
07. Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities – part three
08. Cybercriminals offer fellow cybercriminals training in Operational Security (OPSEC)
09. Fake ‘WhatsApp Missed Voicemail’ themed emails lead to pharmaceutical scams
10. A peek inside the booming underground market for stealth Bitcoin/Litecoin mining tools
11. Cybercrime Trends 2013 – Year in Review
This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
No comments:
Post a Comment