Critical Java hole being exploited on a large scale
Criminals are increasingly exploiting a critical hole in the Java Runtime Environment to infect computers with malicious code when users visit a specially crafted Web page. According to a security blogger, the reason for this increased activity is that the…
New PDF exploit hiding technique tricks antivirus engines
Researchers from AVAST warn of a new technique used by PDF exploits to evade antivirus detection. It relies on encoding the malicious code as an image object. AVAST first encountered this technique in a malicious PDF file a month ago…
Attack Hijacks Data Via Newer Windows Features…
Attack hijacks sensitive data using newer Windows features. Security researchers have outlined a way to hijack huge amounts of confidential network traffic by exploiting default behavior in Microsoft’s Windows operating system. The man-in-the-middle attacks described April 4 take advantage of…