Announcements

Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution

  • 10th March 2015
The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user ...
Continue reading

Vulnerabilities in Microsoft Office Could Allow Remote Code Execution

  • 10th March 2015
The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less ...
Continue reading

Cybercriminals Encrypt Website Databases in RansomWeb Attacks

  • 18th February 2015
Malicious actors are encrypting website databases and holding them for ransom, Switzerland-based security firm High-Tech Bridge revealed on Wednesday. File encrypting ransomware has become highly problematic for both regular Internet users and organizations. However, researchers at High-Tech Bridge have spotted a new type of attack that threatens ...
Continue reading

Microsoft Reports Massive Increase in Macros-Enabled Threats

  • 18th February 2015
The Microsoft Malware Protection Center says there has been a dramatic increase in threats using macros to spread malware via spam and social engineering over the last month. Macros are used for automating frequently used tasks in Office. Macro-related infections were constant and near zero daily up until Dec. 4. Infections spiked ...
Continue reading