Mac Developer: “Nuclear” exploit kit service cashes in on demand from cryptoransomware rings | Ars Technica
“Nuclear” exploit kit service cashes in on demand from cryptoransomware rings | Ars Technica: "Security researchers at Cisco Talos and Check Point have published reports detailing the inner workings of Nuclear, an 'exploit kit' Web service that deployed malware onto victims' computers through malicious websites. While a significant percentage of Nuclear's infrastructure has been recently disrupted, the exploit kit is still operating—and looks to be a major contributor to the current crypto-ransomware epidemic."
Somehow, after I deleted it, Flash was on my machine again.
Labels: security flaw