Hiding an antenna in a shopping cart, researchers tested the success rates of stealing sensitive customer data in near-field contactless payments – and got “consistently good results.”
Hiding an antenna in a shopping cart, researchers tested the success rates of stealing sensitive customer data in near-field contactless payments – and got “consistently good results.”
In recent years, we have seen client-side software heavily targeted by hackers in search of vulnerabilities. 2011 saw these threats become more complex and sophisticated. We saw attackers increasingly use zero-day vulnerabilities, some of which have been particularly critical. Examples of these include the vulnerability Duqu exploited (CVE-2011-3402); a Java vulnerability (CVE-2011-3544); or Adobe zero-day vulnerabilities, which […]
This article was written in collaboration with my colleague Jean-Ian Boutin. The Wigon botnet (also known as Cutwail) is being used in a massive spam campaign. A multitude of ruses are used to get the user to click on a link: fake LinkedIn or Facebook notifications, free Windows licenses, fake deliveries etc. The links are […]
Latest Comments