- Welcome Guest
- Sign In
Many people know it's a bad idea to open attachments in email received from strangers, but relatively few know they need to take the same precautions when clicking links on social media sites and even VoIP service Skype. In recent weeks, cybercriminals have been targeting individuals through Skype, ...
Android is one of the most popular mobile operating systems in the world. As a result, it's also one of the most popular mobile operating systems to be targeted by malware writers. Malware aimed at Google's Android platform increased sixfold during the quarter that ended in September, according to a...
Security researchers have identified a new offshoot of the notorious Flame espionage malware. The malware, called "miniFlame," creates a backdoor in the systems that it infects. That backdoor can then be used by an attacker to gain access an infected machine. The attacker can then write files to the...
Citing recent threats of cyberattacks, the Financial Services Information Sharing and Analysis Center, an industry body set up by the financial services industry, has raised its cyberthreat level from "elevated" to "high." It points to credible intelligence indicating the potential for distributed d...
Twitter-controlled mobile botnets and mobile ransomware are a few examples of what's in store for Internet users, according to the second-quarter McAfee Threats Report. In general, mobile tech has emerged as a major vector for hack attacks, with many that might once have been aimed at PCs now focuse...
One of the most dreaded words for any computer user is "malware." Rogue software and infected files can implant bits of code that log keystrokes, spy on activities, slow down searches and snatch financial information. Users can help protect their PC by installing antivirus software, but even this c...
A well-known iOS hacker who uses the handle "pod2g" revealed a flaw in Apple's mobile operating system, iOS, that he says can be exploited to alter the "reply to" information in SMS messages. Such a tactic could be used by cybermiscreants to pry sensitive information from the recipient of a message ...
Yet another malware attack has emerged in the Middle East. Called "Shamoon," it's hit computers in Saudi Aramco's network, causing a sudden disruption. The specific malware delivered is being referred to as "W32.Disttrack" by Symantec. The attack as a whole was named "Shamoon" after the title of a f...
Kaspersky Lab is reaching out for help to crack the security of the Gauss malware, which it discovered recently. It's still not known how people get infected with the malware, Kaspersky Lab said. The purpose of the "Palida Narrow" font Gauss installs hasn't been figured out, either. But the most int...
The attack last week on journalist Mat Honan's iCloud account has the potential to strip the silver lining from the cybernimbus. Honan had his digital life destroyed when hackers, in a convoluted effort to hijack his Twitter account, ended up trashing everything connected to his Apple iCloud account...
The fallout from the Flame malware that was identified in May continues. Ongoing research into the malware has led antivirus vendor Kaspersky Lab to discover a new malware platform, which it has named "Gauss." This platform has several similarities to Flame, Kaspersky said. "There's no doubt Gauss c...
Some folks' answer to wallet security is chaining it to their belts. Google's is to chain it to the cloud. The Search Giant added some security features to its Google Wallet product last week intended to make it safer for consumers to use. For example, credit card information no longer resides in th...
United States National Security Agency Director Keith Alexander has urged hackers to contribute to securing cyberspace. Speaking at the DEFCON 2012 security conference, Alexander said the hacker community and the U.S. government cybercommunity share some core values. "At DEFCON 20, Gen. Alexander di...
Siemens, which made the industrial controllers targeted by the Stuxnet cyberweapon, announced last week that it was releasing some patches aimed at foiling attacks on its hardware similar to those mounted by the now-famous worm. Previous versions of the controllers used in SCADA systems allowed DLL ...
Microsoft security researcher Terry Zink pulled the pin on a virtual grenade when he aired his belief that he'd discovered a botnet manned by Android zombies. After examining some spam, Zink found suggestions that the junk mail was being generated from Android smartphones with access to Yahoo mail a...