Search Results for
POS
unNamed App (Updated)
Cybercriminals are always trying to figure out the best way to fool users, and I have to admit that sometimes they do it using some…
2nd Security Blogger Summit subscription period opens
• The event will take place at the CÃrculo de Bellas Artes (Madrid), on February 4 • Admission is free and places are limited. Prior registration is…
MS10-002 Exploit Constructor
As humans beings, we tend to be a bit lazy, at least in most of the cases. And cybercriminals are human beings, and therefore, lazy…
Panda @ AV-Comparatives
After some years we have decided to participate again in the AV-Comparatives.org tests. The main driver for this decision has been the evolution of the…
Blog Comment Spam Honeypot
One of the most common vectors for distributing malware nowadays is spamming blogs with comments pointing to malicious sites that host exploits, malware, rogue antiviruses…
What are you doing? Hello Twitter!
Twitter (to utter a succession of small, tremulous sounds, as a bird) is a free service that allows users to send text messages called tweets.…
Blog Comment Spam Honeypot
One of the most common vectors for distributing malware nowadays is spamming blogs with comments pointing to malicious sites that host exploits, malware, rogue antiviruses…