Researchers from security firm Trusteer have found a new variant of the Gozi banking Trojan program that infects a computer's Master Boot Record (MBR) in order to achieve persistence. The Master Boot Record (MBR) is a boot sector that ...
Tags: Computer Products, software
Microsoft has discovered an unusually stealthy Trojan capable of deleting the files it downloads in order to keep them away from forensics investigators and researchers. The Trojan downloader,?called Win32/Nemim.gen!A, is the latest ...
Tags: Microsoft, Computer Products
Cyber criminals are increasingly targeting small businesses due to their less sophisticated defences, according to a new report from Symantec. Companies with 250 employees or less absorbed 18 percent of targeted cyber attacks in 2011, but ...
Tags: Computer Products, software
A Chinese hacking ring, which has been active for four years, has been stealing data from players of more than 30 massively multiplayer online (MMO) role-playing games. That's according to research by security software vendor Kaspersky ...
Tags: Online Games, Computer Products
The results of the quarterly Manufacturers Alliance for Productivity and Innovation (MAPI) Survey on the Business Outlook (EO-123) indicate improvement, albeit marginal, from the previous report, and imply that the manufacturing sector is ...
Tags: MAPI Survey, Business Condition
Facebook Home, the new app that replaces the home screen on an Android smartphone, should be banned from corporate networks to avoid unnecessary security risks, experts say. Facebook introduced Home on Thursday, aiming to give its 1 ...
The Department of Homeland Security (DHS) has a warning for organizations that post a lot of business and personal information on public web pages and social media sites: Don't do it. Phishers, the agency said in an alert this week, look ...
Tags: web pages, social media
The British government has clashed with the European Union over an initiative surrounding the "right to be forgotten" online, arguing Britain should be able to opt out of the upcoming laws. The policy, part of the EU's General Data ...
Organizations face malware-related events that bypass traditional defense technologies on their networks every three minutes, according to a new report released Wednesday by security vendor FireEye. "This activity can include the receipt ...
Tags: Computer Products, software
Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the ...
Tags: Computer Products, software
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher. Ransomware is a class of malicious ...
Tags: Computer Products, software
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher. Ransomware is a class of malicious ...
Tags: Computer Products, software
Microsoft earlier this week quietly issued its first security update for one of its Windows 8 apps, patching a link-spoofing vulnerability in Mail. Two weeks ago, Microsoft spelled out plans for updating its own "Modern" apps, the flat UI ...
Tags: Windows 8, software, Computer Products
Researchers from security vendor FireEye have uncovered a new advanced persistent threat (APT) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the ...
Tags: Computer Products, software
A piece of malicious software spotted by Trend Micro uses the note-taking service Evernote as a place to pick up new instructions. The malware is a backdoor, or a kind of software that allows an attacker to execute various actions on a ...
Tags: Computer Products, softare