malware

Exploit kits in 2015: What can we expect?

This in from Trend Micro:

Since 2006, when the earliest exploit kit (WebAttacker) was made available in the crimeware market, these hack toolkits have become one of the preferred ways for cybercrooks to deliver malware to unsuspecting users.

At the moment, over 70 different exploit kits taking advantage of more than a hundred vulnerabilities are actively used by attackers. The top five list of most used ones goes like this: Sweet Orange, Angler, Magnitude, Rig, and Nuclear.

Apple iOS Now Targeted In Massive Cyber Espionage Campaign

This in fromTrend Micro:

Apple iOS Now Targeted In Massive Cyber Espionage Campaign Attack campaign tied to Russia now zeroing in on mobile user's iPhones, iPads.

An extensive and sophisticated cyber espionage operation targeting mainly Western military, government, defense industry firms, and the media, now has a new weapon: a spyware app for Apple iPhones and iPads.