- Welcome Guest
- Sign In
Google researcher Tavis Ormandy's public disclosure Thursday of a security flaw in Microsoft's Help and Support Center has drawn harsh criticism from Redmond. The flaw, which exists in Windows XP and Windows Server 2003, could let hackers remotely execute code on victims' computers. Microsoft is ang...
Symantec is planning to introduce two mobile apps and a Software as a Service security application under an initiative dubbed "Norton Everywhere." The two apps are Norton Smartphone Security for Android Beta and Norton Connect Beta. The third product, Norton DNS Beta, is a cloud-based service throug...
Newer versions of Microsoft's operating systems and software products are better at fighting cybercrime than older versions, according to new research. Windows 7 and Windows Vista with Service Pack 2 had the lowest infection rates of any Microsoft OS, found the "Microsoft Security Intelligence Repor...
Symantec announced on Tuesday four new security and compliance software suites that it claims remedy the most common security shortcomings exploited by today's targeted attacks. These latest software security products complement the company's four-pronged approach based on the phases of a targeted b...
Hiring a professional penetration tester is often a humbling experience. Using a mix of simple social engineering and technology savvy, a professional is often able to expose dangerous security holes in an organization's IT infrastructure with ease. In a few days, a penetration tester can identify ...
IBM is joining forces with the U.S. Federal Aviation Administration to protect the nation's civilian aviation system from the ever-growing threat of cyberattacks. They are working on building a prototype security system capable of protecting the vast amount of information flowing daily through the F...
If you're using Energizer's Duo USB battery charger software to monitor your battery charging status, it's probably a good idea to shut it down and uninstall it pronto. The software designed to work with the Duo contains a backdoor Trojan that lets unauthorized users access a PC remotely, among othe...
Although its operating system and apps are so buggy that new vulnerabilities are discovered with frightening regularity, Microsoft now wants Internet users to pony up to cover the cost of cybersecurity. The idea was put forth by Scott Charney, Redmond's vice president for trustworthy computing, duri...
The three men accused of unleashing a vicious cyberassault that infected millions of computers worldwide may now be in jail, but the damage they left behind should serve as a warning for computer users to stay vigilant. The Mariposa botnet, a massive network of infected computers designed to steal a...
Microsoft did its best Woody Harrelson impression this week and set out to bag some zombies. The zombies we're talking about here are PCs infected with malware. The bad guys spread the malware around and then remotely control victims' computers as part of a botnet that can do stuff like send out spa...
Microsoft has brought a major botnet to its knees using a combined technical and legal strategy that it expects to deploy again. Earlier this week, a federal judge granted Microsoft a temporary restraining order that cut off 277 Internet domains believed to be run by criminals as the Waledac bot, ac...
News that students in two Chinese schools could be behind recent well-publicized online attacks on Google and other major U.S. corporations doing business in China has security experts running for cover. McAfee, which has dubbed the hacks "Operation Aurora," described the series of attacks as highly...
As botnets go, the Kneber botnet, which has hit about 75,000 PCs in roughly 2,500 companies worldwide, is fairly minuscule. However, it's disproportionately dangerous because it's aimed at very specific targets -- corporations and government departments -- whose PCs store critically important inform...
Earlier this week, Cyber ShockWave, a simulated cyberattack on America, once again showed that the U.S.'s cybersecurity is not up to the task of protecting the country's infrastructure. Under the hypothetical scenario cooked up by Cyber ShockWave's planners, the attack was launched through smartphon...
As the 2010 Winter Olympics kick off, the games are on everyone's radar, including the cybercriminals who are looking to capitalize on this world event. Spam campaigns featuring breaking news stories filter through to in-boxes faster than ever before, as automated scripts scrape headlines and the te...