Security researcher Michael Coppola demonstrated how small and home office (SOHO) routers can be compromised and turned into botnet clients by updating them with backdoored versions of vendor-supplied firmware. Coppola, who is a security ...
Tags: SOHO routers, botnet clients, backdoored versions, firmware
LetMobile , a leading provider of Secure Corporate Collaboration Solutions for Personal Mobile Devices, today announced a new version of its Secure Mobile E-mail Gateway product. LetMobile is the first to offer a gateway-based DLP and ...
Tags: LetMobile, Personal Mobile Devices, Secure Mobile Emai, mobile device
A piece of malware called Mahdi or Madi has been used to spy on hundreds of targets from Iran, Israel and a few other Middle Eastern countries during the past eight months, according to researchers from security vendors Seculert and ...
Tags: malware, Mahdi, Iran, Israel, Middle Eastern countries, computers
Misleading statements and fiction about toy safety are often communicated to the general public. The public must have access to the facts, so that they can make informed decisions about purchasing safe toys for their children. We want to ...
Tags: Toys, Toy Safety, Misleading statements, fiction
Locating and tracking an object via radio waves has been in everyday use since the WWII invention of RADAR (Radio Detection And Ranging). Today, everybody from automobile drivers to airline pilots to mapmakers to construction professionals ...
Tags: radio waves, WWII invention, RADAR, automobile drivers, GPS
Shopping or banking online depends on trust. Individuals interact with sites that they trust, and sites have to trust the person who is transacting with them. Many online banking sites are turning to two-factor authentication to confirm ...
Tags: Banking fraud, education issue, online banking, trust
Criminals are sending malicious emails that purport to come from payroll services firms in order to infect with malware the computers of payroll administrators from various companies, according to researchers from the SANS Internet Storm ...
Tags: criminals, malicious emails, payroll services firms, ISC
Conventional wisdom says that car deals are better at the end of the year.But is this still true?Our analysis shows,some new-car offers in late December are great,while others are just hype. Working with TrueCar,our data analysts ...
Tags: Conventional wisdom, Car Deals, hype
Researchers from security vendor Damballa have identified malicious Internet traffic that they believe is generated by a new and elusive variant of the sophisticated TDL4 malware. The new threat, which has been assigned the generic name ...
Tags: TDL4 malware, Internet traffic, elusive variant, Fortune 500 Companies
CoDeSys, a piece of software running on industrial control systems (ICS) from over 200 vendors contains a vulnerability that allows potential attackers to execute sensitive commands on the vulnerable devices without the need for ...
Tags: Digital Bond, Flaw, patch, vulnerability, control systems
In a new twist, spammers have built a botnet that sends SMS spam through infected Android phones, shifting the potentially pricey cost of sending spam to victims. The trend, spotted by security vendor Cloudmark, poses a new challenge ...
Tags: spammers, a mobile spam campaign, spam messages, Android
High-risk and dangerous applications targeting users of Google’s Android platform increased from nearly 30,000 in June to almost 175,000 in September, according to Trend Micro’s security roundup report for the third quarter of ...
Tags: Android, cyber security, devices, malware, Trend Micro
A growing army of malware delivery networks, known as malnets, account for two thirds of all cyber attacks, and security firm Blue Coat claims most current technologies offer an inadequate response to the threat, according to new analysis. ...
Tags: Blue Coat, botnet, cyber attack, Malnet, malware
Rogue Iron Ore Corporation held its Annual General and Special Meeting on December 10th 2012. The purpose of the AGSM included obtaining security holder approval of a proposed spin out of Rapier Gold Inc. Rapier's intention is to combine ...
Tags: Rogue Iron Ore Corporation, gold discovery, Pen Gold North property
The Windows version of Crisis, a piece of malware discovered in July, is capable of infecting VMware virtual machine images, Windows Mobile devices and removable USB drives, according to researchers from antivirus vendor Symantec. Crisis ...
Tags: Windows version, crisis malware, VMware virtual machine, mobile devices