Blog Posts Tagged with "Clickjacking"

69dafe8b58066478aea48f3d0f384820

Symantec Reverse Engineers OS X Flashback Malware

May 14, 2012 Added by:Headlines

Symantec researchers reverse engineered components of the Flashback malware that recently infected more than 600,000 Mac systems and reveal that it was designed in part as a highly profitable ad-clicking operation that could be net the Trojan's creators $10,000 per day...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook Attacks Feed Affiliate Marketing Scams

January 04, 2012 Added by:Headlines

"After users first click on the scams, malware or malicious scripts are to blame for the further spread of slightly over half the analyzed scams, with those falling into three main categories: likejacking, rogue applications, and malware or self-XSS..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten HTML5 Attack Vectors

December 09, 2011 Added by:Headlines

"HTML 5 applications use DOM extensively and dynamically change content via XHR calls. DOM manipulation is done by several different DOM-based calls and poor implementation allows DOM-based injections. These injections can lead to a set of possible attacks and exploits..."

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Warning: DNS Changer Lives

November 17, 2011 Added by:Simon Heron

Despite federal prosecutors recent success against the infrastructure of DNS Changer and the prosecution of seven, it appears that the malware itself still survives. With its ability to infect and change systems’ DNS so that users were then redirected to websites of the scammers choosing...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI Claims Biggest Cybercrime Takedown in History

November 10, 2011 Added by:Headlines

"The malware secretly altered the settings on infected computers enabling the defendants to digitally hijack Internet searches and re-route computers to certain websites and advertisements, which entitled the defendants to be paid. The defendants subsequently received fees each time..."

Comments  (0)

Bddd055f2567b4952d8416e168aace64

Web Insecurity: 7 Steps We Should Demand of Advertisers

September 12, 2011 Added by:Chris Weber

The advertising industry can should mitigate the threat of malware by constraining the capabilities of scripting to address arbitrary content, proxying content, and filtering content for malware. Here are seven security essentials that web servers and advertisers must undertake...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Oslo Bombing Facebook Scam Infects One Per Second

July 25, 2011 Added by:Headlines

"Be cautious when clicking on breaking news trends and stories within search results related to the Oslo tragedy. Right now it seems to be infecting one user every second. The scam is a form of ‘clickjacking’ that replicates itself on users’ walls after they click on fake posts..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Internet Hack Techniques of 2010

January 24, 2011 Added by:Headlines

Black Hat, OWASP and White Hat Security have released their picks for the top ten web hacking techniques of 2010. Details of the techniques will be presented at the IT-Defense 2011 conference in Germany in February...

Comments  (0)