Blog Posts Tagged with "Malvertising"

Ffc4103a877b409fd8d6da8f854f617e

Malvertising and Exploit Kits Still a Significant Threat: FireEye

March 18, 2017 Added by:InfosecIsland News

Malicious online ads and the exploit kits (EK) used to infect computers with various types of malware continue to pose a significant threat, FireEye warns.

Comments  (0)

Bff69da3ab11dd09027195fd431c4b09

Exploit Kits: Infiltrating the Ad Industry with Traditional Tactics

August 11, 2016 Added by:Karl Sigler

Exploit kits are increasingly using the evil twin of an advertisement, a malvertisement, as a gateway to a web browser.

Comments  (0)

766e428d1e232bbdd58664b41346196c

Poisoning the Well: Why Malvertising is an Enterprise Security Problem

September 18, 2014 Added by:Elias Manousos

While customers won’t know or care which ad network delivered a malicious ad, they will blame the organization that owns the website or placed the ad that attacked them.

Comments  (2)

3750d420f6c2a9844b529978894dc0be

Steam Attack Puts Users at Risk of Spear Phishing

November 15, 2011 Added by:Josh Shaul

A good implementation of salting before hashing can yield very secure results – however weak implementations that used fixed salt are not all that unusual, and those are quite easy to break. The stored credit card numbers were encrypted. It’s likely that these will be difficult to extract...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

OTA's Sixth Annual Online Trust Forum

July 13, 2011 Added by:Headlines

“As our lives, jobs and society are increasingly reliant on Internet services, we need to proactively address the issues and practices raised from the convergence of mobile, cloud and social media. User trust is proving to be a defining factor of business success, innovation and regulation..."

Comments  (0)

F7e202a206691e473e509d080620af68

Malvertising: The Use of Malicious Ads to Install Malware

June 13, 2011 Added by:Lenny Zeltser

Perhaps the future will bring malvertising campaigns where Flash-based ads usurp the victim's CPU cycles to run computations, such as distributed password cracking. Another potential is to use the browser for Bitcoin mining; such operations are already possible using pure JavaScript...

Comments  (1)