An exploit for a previously unknown and currently unpatched vulnerability in Java is being used by cybercriminals to infect computers with malware, according to security researchers. An independent malware researcher who uses the online ...
Tags: exploit, unpatched vulnerability, Java, cybercriminals
Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will adopt this approach, according to the team from vulnerability assessment and penetration ...
Tags: Security researcher, botnet, Tor network, DDoS
A recent Java 7 update allows users to completely prevent Java applications from running inside browsers or to restrict how Web-based Java content is handled by the Java Runtime Environment (JRE) client. These features will benefit ...
Partnership aims to avoid business disruptions and loss for Philippine local companies and SMEs MANILA, PHILIPPINES, September 10, 2012 /24-7PressRelease/ -- Acer Philippines and ShadowProtect software, through IT distribution company ...
Tags: Acer Philippines, Computer Products, ShadowProtect, Data
IDG News Service - Google on Thursday dismissed the possibility that a new wave of pharmacy, penny stock and e-card spam emails are being sent by Android spam botnets. "Our analysis suggests that spammers are using infected computers and ...
Tags: Google, pharmacy, penny stock, spam email, computers
IDG News Service - The U.S. Federal Communications Commission is advising smartphone users on how to protect their mobile devices and data from mobile security threats. The Commission released an online tool called the "Smartphone ...
Tags: FCC, security advice, smartphone, mobile devices.data
Bitdefender has launched the free 60-Second Virus Scanner desktop app, adding a layer of elite cloud-based protection to PCs worldwide in an all-out assault on malware. Being a cloud-based solution it's always up to date and has no impact ...
Tags: virus scanning tool, Virus Scanner, desktop app, malware
Facebook Gifts, the new social gifting service launched by Facebook on Thursday, might encourage users to expose information like their home addresses, birth date, clothing or shoe size that could pose security and privacy risks, according ...
Tags: Facebook Gifts, social gifting service, Facebook, users, information
Attackers can abuse Facebook's phone search feature to find valid phone numbers and the names of their owners, according to security researchers. The attack is possible because Facebook doesn't limit the number of phone number searches ...
Tags: Facebook, phone search feature, valid phone numbers, security researchers
Over half of Android devices are vulnerable to known security flaws that can be exploited by malicious applications to gain complete access to the operating system and the data stored on it, according to a report from mobile security firm ...
Tags: Android, applications, critical, devices, vulnerabilities
Golden Systems Middle East, a leading distributor of IT products in the Middle East, announced that it has won the 'Best Brand promotion initiative' award from Reseller Middle East at the inaugural Reseller Hot 50 Awards held at the H ...
Tags: Golden Systems Middle East, IT products, marketing campaign
Several malicious Android apps designed to steal mobile transaction authentication numbers (mTANs) sent by banks to their customers over SMS (Short Message Service) were found on Google Play by researchers from antivirus vendor Kaspersky ...
Tags: Computer Products, Apps, SMS, Google Play
Over half of Android devices are vulnerable to known security flaws that can be exploited by malicious applications to gain complete access to the operating system and the data stored on it, according to a report from mobile security firm ...
Tags: Android device, security flaws, malicious applications
BitDefender Labs has discovered Android malware that regularly broadcasts the location of the infected mobile device to a remote server. What the malware creators intend to do with the privacy-invading information is not clear. The app ...
Tags: Android malware, infected mobile device, remote server
Attackers can abuse Facebook’s phone search feature to find valid phone numbers and the name of their owners, according to security researchers. The attack is possible because Facebook doesn’t limit the number of phone number ...
Tags: Facebook, highlightedpost, Mark Zuckerberg, Phone number search, privacy