AOL has taken steps to stop a set of malicious advertisements being served through their sites, including The Huffington Post, Computer Business Review reports.
2014 was a big year for the security industry and a busy one for AVG. There were high profile security breaches, some incredible new apps for our smartphones and huge game releases that pushed the performance of our devices to the limit.
Threats:
Heartbleed was arguably the most significant security story of the year after a crucial vulnerability was found in Open SSL, the technology used to encrypt data online. Potentially, OpenSSL estimate that as many as 66% of all websites were vulnerable.
One of the year’s most prevalent malware breakouts, known as GameOver Zeus was also amongst our top stories. GameOver Zeus picked up a lot of media coverage as experts gave a two week countdown until a massive suspected cyber-attack would be unleashed.
Mobile:
AVG had a big year for mobile with exclusive deals to protect Sony Xperia devices and we even created custom apps specifically designed for the Amazon Fire Phone’s ‘Dynamic Perspective’.
We also sealed the acquisition of Location Labs which has brought powerful security and device management features to millions of people.
In November, we release our first ever Android App Performance Report which detailed the secret ways that the apps we use can affect our smartphones. How much space they take up, how much battery they use and how much data they send.
Gaming:
Gaming also enjoyed a big year in 2014 with the release of many big name titles including Watch Dogs, where you play a hacker in a beautifully rendered open world. Our performance expert Sandro Villinger’s Ultimate Watch Dogs performance guide for the PC was our third most popular post this year.
Researchers have detected a malvertising campaign running on a pair of sites owned by Huffington Post that is using ads distributed through an AOL ad network. The attack is sending victims through a series of redirects that eventually brings them to a landing page that is running an exploit kit. The campaign emerged first on huffingtonpost.ca […]
An analysis of Cryptowall 2.0 reveals that the ransomware relies on complex encryption routines and sandbox detection capabilities to survive. It also uses Tor for command and control, and can execute on 32- and 64-bit systems.
Some Skype users have reported seeing malicious ads inside their Skype clients in recent days that lead to a site that tries to download a fake Adobe or Java update. Users in the Skype community forum on Monday said that they have been seeing a banner ad that, if clicked on, will lead to a […]
The website of the Internet Systems Consortium, the developers of the BIND DNS software deployed all over the Web, was reportedly infected with malware last week.
The attackers behind the SoakSoak malware campaign are continuing to modify their tactics and have infected a new group of Web sites. The Javascript code that the attackers target with the malware has also changed. Last week, Google took the step of blacklisting thousands of sites that had been infected by SoakSoak. The malware is targeting WordPress […]
The wonderful and terrifying thing about the security world is that things never stay calm for long. As soon as you think you have a chance to catch your breath, someone breaks something and it’s time to scramble again. In 2014, those small moments of downtime were hard to come by.
Staples confirmed that it lost close to 1.2 million payment cards in a data breach lasting close to six months and affecting 115 locations in 35 states.