New Android Malware Receives Instructions From Blog
Researchers from Trend Micro have discovered a piece of malicious software for Android that receives instructions from an encrypted blog, a new method of communication for mobile malware, according to...
View ArticleWikipedia Says Don’t Blame Them If Ads Appear On Their Site
Visitors to Wikipedia who are suddenly seeing advertisements on the site have most a victim to a browser-based malware infection, Wikimedia Foundation, the organization operating the website, said...
View ArticleGerman Government Comes Out Against Internet Explorer
The German government urged the public on Tuesday to temporarily discontinue using Microsoft Corp’s Internet Explorer following discovery of yet-to-be repaired security flaw in the web browser that the...
View ArticleGoogle Expands on Chrome’s ‘Canary’ Malware Blocker
Google has expanded malware blocking in an early development build of Chrome to sniff out a wider range of threats than the browser already recognizes. Chrome’s current “Canary” build — the label for...
View ArticleBanking Malware Infections Highest Since 2002
Malicious software geared towards stealing online banking credentials surged in the third quarter of this year to a level not seen since 2002, according to a new report from Trend Micro. The security...
View ArticleFireEye Buys Into E-Forensics
FireEye's cloud-based systems for detecting malicious software and Mandiant's software that analyzes cyber attacks have been doing well while traditional security companies have done less well.
View ArticleZeus Malware Attached To Cancer Email Scam
It immediately begins checking to see if it is being analysed, by making long sleep calls, and checking to see if it is running virtually or in a debugger.
View ArticleSpamhaus To Roll Out New Data Feeds To Combat Malware
The Spamhaus Project will soon provide two new data feeds aimed at preventing people from being lured to malware-infected websites and domains. The organization, which has long been in the forefront of...
View ArticlePolice Increasingly Turning To Mobile Spyware For Monitoring
Governments are increasingly relying on malware for mobile devices to spy targets, raising questions over the possible misuse of such tools, a new study suggests. The Citizen Lab, part of the Munk...
View ArticleResearchers Warn USB Devices Can Be Used In New Hacking Schemes
USB devices such as mice, keyboards and thumb-drives may be used to hack into personal computers in a potential new class of attacks that evade all known security protections, a top computer researcher...
View ArticleMalware Wasn’t Only Reason For Ukrainian Power Outage
New research of a cyberattack last month against Ukrainian power companies suggests malware didn’t directly cause the outages that affected at least 80,000 customers. Instead, the malware provided a...
View ArticleElectronic Signature Service DocuSign Reports Hacking
Electronic signature service DocuSign revealed that hackers had temporarily gained access to a database that houses customer emails, which the company linked to a surge in phishing emails sent to its...
View ArticleAre Hackers Targeting Forensics Firms
At present, there's no conclusion of the case, with investigations still ongoing. Because of the sensitive nature of the case, details of how that is progressing are likely to be limited.
View ArticleAre Hackers Keeping Cybersecurity Analyst Busy
This may be due to a lack of faith in the industry’s ability to solve the key shortage, rather than a belief that doing so is of little importance. Again, regulation and compliance are not seen as a...
View ArticleUber Appears To Be Making Hackers Sign Certain Agreements
US attorney for Northern California Dave Anderson told CBS News correspondent Kris Van Cleave this in an exclusive interview. Anderson, who investigated the hack, said there's "no way to know...
View Article
More Pages to Explore .....