The instigators of many targeted attacks are fond of using the CVE-2012-0158 vulnerability, which affects mscomctl.ocx in Microsoft Office and some other Microsoft products. We have seen seve
Author: McAfee Labs
Verizon’s recent release of the 2014 Data Breach Investigations Report (DBIR) provided its usual valuable insights into the state and scale of cyberattacks. But those of us who spend our waki
The trend of attackers using stolen digital certificates to disguise their malicious executables is on the rise. The Shiqiang group is known to employ spear-phishing attacks against nongovernmental
Online scammers are always seeking to trick victims into paying money. Sports betting is a common lure for online scams to attract those who enjoy the thrill of gambling on sports. Usually these sc