In the second technical article of this series, Fraser Howard investigates deeper into the workings of Redkit exploit kit.
Learn more about the internals of this kit; bypassing of security mechanisms within Java, the use of file encryption, and delivery of multiple payloads.
In the first of a two part series, Fraser Howard takes a closer look at the Redkit exploit kit.
Learn more about how this kit works and the compromised web servers that are being used to host it.
Malware researcher Paul Baccas reveals how an Excel spreadsheet using the password "VelvetSweatshop" could be designed to put your computer at risk.
A recent report by the US Inspector General revealed staggering flaws in the US military's management of mobile devices, and a severe lack of basic IT security protection in place for such devices.
Phishing is often regarded as old hat. From a technical perspective, it's a case of 'been there, done that'. Sometimes however, we come across attacks that are just a little bit more interesting (or at least different) from the norm.
It's that time of the week again - here's your roundup of everything we wrote in the last seven days.
SophosLabs has been tracking an infection of Mal/Iframe-AL on Seagate's blog since late February.
Are you taking enough care of your company's websites?
Sometimes an insult can be amusing.. and even strangely complimentary.
Here's something which raised a smile for researchers at SophosLabs.
SophosLabs has seen huge volumes of legitimate sites being compromised with malicious redirects in recent weeks.
Fraser Howard explains what's going on, and how the compromised web servers are almost exclusively running Apache.
What's a reasonable price to pay to get your data safely returned to you from the guys who stole it?
How about 10,000 Rubles? No?
According to the cybercriminals behind this new ransomware targeting Russians, the answer is "да".
USA! USA! USA! is back on top as the world’s leading spam-relaying country.
See what other countries top our 'dirty dozen' list and get the latest spam stats from SophosLabs.
Gabor Szappanos from SophosLabs takes a detailed examination of a targeted attack involving multiple stages and an innocent signed application - from the social engineering in the initial lure, to the technical capabilities of the malware it delivers.
A new technical paper from SophosLabs explores the history and technology of ransomware. From payment by SMS to public key encryption, ransomware has certainly evolved.
A targeted Mac malware attack strikes a minority group in China, exploiting an old Microsoft Word vulnerability.