Quantcast
Channel: twitter – Webroot Threat Blog
Browsing all 23 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Twitter adds HTTPS support by default

On Monday, Twitter announced that it’s introducing support for secure HTTPS connections to all users by default. More details: Last year, we added the option to always use HTTPS when accessing...

View Article



Image may be NSFW.
Clik here to view.

How cybercriminals monetize malware-infected hosts

The vibrant cybercrime underground ecosystem offers countless ways to monetize the malware-infected hosts at the disposal of the malicious attacker. From converting them to anonymization proxies...

View Article

Image may be NSFW.
Clik here to view.

Spamvertised ‘YouTube Video Approved’ and ‘Twitter Support” themed emails...

Just like true marketers interested in improving the click-through rates of their campaign, pharmaceutical scammers are constantly looking for new ways to attract traffic to their fraudulent sites....

View Article

Image may be NSFW.
Clik here to view.

New Russian service sells access to compromised social networking accounts

On daily basis, hundreds of thousands of legitimate accounts across multiple social networks get compromised, to be later on abused as a platform for launching related cyber attacks and social...

View Article

Image may be NSFW.
Clik here to view.

Cybercriminals target Twitter, spread thousands of exploits and malware...

Twitter users, beware! Over the past several days, cybercriminals have been persistently spamvertising thousands of exploits and malware serving links across the most popular micro blogging service....

View Article


Image may be NSFW.
Clik here to view.

Hacked Origin, Uplay, Hulu Plus, Netflix, Spotify, Skype, Twitter, Instagram,...

Aiming to capitalize on the multi-billion gaming market, cybercriminals actively data mine their botnets for accounting credentials, not just for popular gaming platforms, but also the actual...

View Article

ThreatVlog Episode 3: NYT, Twitter, and HuffPost hacked by Syrian Electronic...

In this episode of ThreatVlog, Grayson Milbourne covers the information behind the Syrian Electronic Army’s hacking of New York Times, Twitter, and Huffington Post. Grayson includes a breakdown of the...

View Article

Image may be NSFW.
Clik here to view.

Newly launched E-shop offers access to hundreds of thousands of compromised...

In a series of blog posts, we’ve highlighted the ongoing commoditization of hacked/compromised/stolen account data (user names and passwords), the direct result of today’s efficiency-oriented...

View Article


Image may be NSFW.
Clik here to view.

How cybercriminals efficiently violate YouTube, Facebook, Twitter, Instagram,...

With social media, now an inseparable part of the marketing expenditures for every modern organization, cybercriminals quickly adapted to the ongoing buzz, and over the last couple of years, have been...

View Article


Image may be NSFW.
Clik here to view.

Sony’s PSN Network Haymaker’d by DDoS Attack; Exec’s Plane Grounded Over Bomb...

Sony had a rough weekend. And not just Sony; last weekend wasn’t the best time to be a gamer. Here’s the skinny… Early yesterday morning, Sony’s PlayStation Network (PSN for short) was hit with a...

View Article

ThreatVlog Episode 3: NYT, Twitter, and HuffPost hacked by Syrian Electronic...

In this episode of ThreatVlog, Grayson Milbourne covers the information behind the Syrian Electronic Army’s hacking of New York Times, Twitter, and Huffington Post. Grayson includes a breakdown of the...

View Article

Image may be NSFW.
Clik here to view.

Newly launched E-shop offers access to hundreds of thousands of compromised...

In a series of blog posts, we’ve highlighted the ongoing commoditization of hacked/compromised/stolen account data (user names and passwords), the direct result of today’s efficiency-oriented...

View Article

Image may be NSFW.
Clik here to view.

How cybercriminals efficiently violate YouTube, Facebook, Twitter, Instagram,...

With social media, now an inseparable part of the marketing expenditures for every modern organization, cybercriminals quickly adapted to the ongoing buzz, and over the last couple of years, have been...

View Article


Image may be NSFW.
Clik here to view.

Sony’s PSN Network Haymaker’d by DDoS Attack; Exec’s Plane Grounded Over Bomb...

Sony had a rough weekend. And not just Sony; last weekend wasn’t the best time to be a gamer. Here’s the skinny… Early yesterday morning, Sony’s PlayStation Network (PSN for short) was hit with a...

View Article

ThreatVlog Episode 3: NYT, Twitter, and HuffPost hacked by Syrian Electronic...

In this episode of ThreatVlog, Grayson Milbourne covers the information behind the Syrian Electronic Army’s hacking of New York Times, Twitter, and Huffington Post. Grayson includes a breakdown of the...

View Article


Image may be NSFW.
Clik here to view.

Newly launched E-shop offers access to hundreds of thousands of compromised...

In a series of blog posts, we’ve highlighted the ongoing commoditization of hacked/compromised/stolen account data (user names and passwords), the direct result of today’s efficiency-oriented...

View Article

Image may be NSFW.
Clik here to view.

How cybercriminals efficiently violate YouTube, Facebook, Twitter, Instagram,...

With social media, now an inseparable part of the marketing expenditures for every modern organization, cybercriminals quickly adapted to the ongoing buzz, and over the last couple of years, have been...

View Article


Image may be NSFW.
Clik here to view.

Sony’s PSN Network Haymaker’d by DDoS Attack; Exec’s Plane Grounded Over Bomb...

Sony had a rough weekend. And not just Sony; last weekend wasn’t the best time to be a gamer. Here’s the skinny… Early yesterday morning, Sony’s PlayStation Network (PSN for short) was hit with a...

View Article

ThreatVlog Episode 3: NYT, Twitter, and HuffPost hacked by Syrian Electronic...

In this episode of ThreatVlog, Grayson Milbourne covers the information behind the Syrian Electronic Army’s hacking of New York Times, Twitter, and Huffington Post. Grayson includes a breakdown of the...

View Article

Image may be NSFW.
Clik here to view.

Newly launched E-shop offers access to hundreds of thousands of compromised...

In a series of blog posts, we’ve highlighted the ongoing commoditization of hacked/compromised/stolen account data (user names and passwords), the direct result of today’s efficiency-oriented...

View Article
Browsing all 23 articles
Browse latest View live




Latest Images