Those popular mobile apps that everyone's buying from the official Android and Apple apps stores for business and fun are being torn apart by hackers who turn around and post these abused apps filled with malware, their content pirated or ...
Tags: mobile apps, Android, Apple, apps stores, malware
Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale online. In the past year, cyber criminals have used ...
Tags: Protection, Cyber Crime, Products
Enterprise IT security professionals faced increasingly sophisticated, stealthy and dynamic threats in 2012, but numerous surveys revealed that knowledge and understanding of the latest attack techniques are lacking in many organisations. ...
Tags: IT security, user security awareness, IT industry, cyber
A security scare for Microsoft users hit late yesterday, after vulnerability management company Rapid7's Metasploit penetration tool project discovered an Internet Explorer exploit that is said to affect all browsers earlier than IE9, and ...
With so many cyber attacks in the news recently, executives are becoming increasingly concerned about their organisation’s exposure to hackers. And so they should. According to our research, more than three-quarters of the Forbes ...
Tags: cyber attacks, hacker, Internet, network
Less than 5% of the top 40 antivirus systems are able to detect previously non-cataloged viruses initially, a study has revealed. A test by security firm Imperva, which used more than 80 previously non-catalogued viruses, showed that many ...
Tags: antivirus systems, Enterprise security, Antivirus solutions
IT security budgets are not being used to provide defence technology in some of the areas the enterprise is most likely to need it in, a study has revealed. About 33% of hacker forum discussions are about training and tutorials for data ...
Tags: IT, Hacker, Computer Products, IT Security
The FBI says there is "no evidence" that hacker group Anonymous gained access to 12 million identity codes for Apple devices by hacking an FBI agent's laptop. The group posted a file online that it claimed contained a sample of around one ...
Tags: FBI, Apple, Computer Products
More than one in four Wi-Fi networks in London are poorly secured or not secured at all, a scanning experiment by security firm Sophos has revealed. The experiment was conducted over two days by the firm’s director of technology ...
Tags: WiFi networks, Sophos, technology strategy, wireless network
The last member of a US cybercrime trio that netted up to $3m in a Wi-Fi and malware hacking spree has been sentenced. Joshuah Allen Witt, 35, John Earl Griffin, 36, and Brad Eugene Lowe, 39, have all now been given stiff prison terms. ...
Tags: Hacker, Hacking Spree, Computer Products
Security supplier Sophos has combined its endpoint protection and unified threat management (UTM) products into a single physical or virtual appliance. Sophos claims UTM 9 will cut the time and resources IT teams have to spend on ...
Tags: Sophos, UTM, Endpoint Security, Computer Products
Home secretary Theresa May is to announce a decision on self-confessed computer hacker Gary McKinnon's extradition to the US. At the same time, Theresa May is expected to announce changes to the UK's extradition arrangements with the US, ...
Tags: Theresa May, computer hacker, Gary McKinnon, extradition
Macworld - Following in the footsteps of Google and other services, Dropbox this weekend enabled two-factor authentication to bring enhanced security to its users. While Dropbox was not among the services compromised in the ...
Tags: Google, Dropbox, potential hacker, Two-Step Authentication
IDG News Service - It appears the hacker known as "Pinkie Pie" produced the first Chrome vulnerability at the Hack In the Box conference on Wednesday, just ahead of the deadline for the competition this afternoon. Google security ...
Tags: Pinkie Pie, Chrome vulnerability, software, company news
Thousands of protesters have been converging on Lynas Corporation's new rare earths processing facility in Malaysia according to reports. The Australian producer's website was also hacked over the weekend. According to the Sydney ...
Tags: Australia, Malaysia, Rare Earth