12 Results for

m86

Article

Security firm M86 acquires Finjan

M86 makes second acquisition in the past year, buying secure SaaS and Web gateway provider Finjan.

By November 3, 2009

Article

Facebook, spammers are in 'arms race'

Spammers modify attacks after Facebook rolls out new security features to block attacks.

By May 16, 2011

Article

Don't fall for 'First Exposure: iPhone 5' Facebook scam

Spammers lure victims on Facebook with what looks like link to news about next-generation iPhone.

By May 11, 2011

Article

Phishers use HTML attachments to evade browser blacklists

Successful attacks require recipients of phishing e-mails to open an HTML attachment and fill out a form before data is sent to a compromised Web server for harvesting.

By March 16, 2011

Article

Beware enticing Bieber links, free offers on Facebook

Scammers are exploiting Bieber mania to trick people into unwittingly "liking" a scam message and spreading it on Facebook.

By March 1, 2011

Article

Zeus Trojan steals $1 million from U.K. bank accounts

This story was corrected by removing misinformation provided by M86 about statistics related to non-Windows machines. Such machines, including Macs, were not affected by this attack.

By August 13, 2010

Article

Zeus Trojan steals $1 million from U.K. bank accounts

New, dangerous combination of banking Trojan and exploit toolkit enables criminals to transfer money out of accounts while users are logged into the bank site, without them knowing it.

By August 10, 2010

Article

Report: Adobe Reader, IE top vulnerability list

New M86 Security Labs report says holes in Adobe Reader and Internet Explorer are targeted most by attackers.

By July 14, 2010

Article

Finjan sues McAfee, Symantec over patents

Security companies Webroot Software, Websense, and Sophos are also targeted in the suit, which claims they are violating two patents.

By July 15, 2010

Article

Zeus botnet jumps on PDF design flaw

Attackers start exploiting a flaw in Adobe's format to spread Zeus just days after the publication of a proof-of-concept exploit for the flaw.

By April 19, 2010