Security researchers from Trend Micro have uncovered an active cyber-espionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and ...
The government has snuck in new proposals to investigate cybercrime in the Queen's Speech, after the controversial Communications Data Bill was dropped. The Bill, dubbed a 'Snooping Charter' by critics, was to allow unparalleled ...
Tags: Computer Products, Data Bill
McAfee said it has found a vulnerability in Adobe Systems' Reader program that reveals when and where a PDF document is opened. The issue is not a serious problem and does not allow for remote code execution,?wrote?McAfee's?Haifei Li in a ...
Tags: McAfee Spots, PDF-Tracking Flaw
A federal court in Houston has rejected an FBI request for a warrant to hack into the computer of a suspect in an attempted cyberheist. In, a sometimes testy, 13-page ruling earlier this week, U.S. Magistrate Judge Stephen Smith of the ...
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher. Ransomware is a class of malicious ...
Tags: Computer Products, software
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher. Ransomware is a class of malicious ...
Tags: Computer Products, software
Google has fully implemented a security feature that ensures a person looking up a website isn't inadvertently directed to a fake one. The Internet company has run its own free public Domain Name System (DNS) lookup service, called Public ...
Tags: Google, Computer Products
The London Olympics faced six major cyber attacks during the Games out of some 165 million individual security-related "events" identified by the IT team put together by Gary Pennell, the CIO of the London 2012 Olympics. Cloud was a ...
You’ve got to hand it to the IT wizards at The Pirate Bay–they certainly know how to have fun with their infrastructure set-up. Echoing a prank from 2007, the Pirate Bay on Monday claimed the site was now being hosted in North ...
The attacks discovered last week that exploited a previously unknown Java vulnerability were likely launched by the same attackers that previously targeted security firm Bit9 and its customers, according to researchers from antivirus vendor ...
Tags: Java, Bit9, technology
In a move to counter recent reports claiming that a special unit in the Chinese Army is behind repeated cyber attacks on U.S. institutions, the nation Thursday claimed its military and defence ministries websites are routinely hacked from ...
China this week faced allegations that it is helping the Zambian government with deep packet inspection technology in order to eavesdrop, mine data, censor and intercept communications. The allegations come less than two years after the ...
Tags: Zambian government, packet inspection technology, Chinese tech
Barracuda Networks released a new update on Monday to further mitigate a security issue that could have allowed attackers to gain unauthorized access to some of its network security appliances through backdoor accounts originally intended ...
Tags: Barracuda Networks, security issue, network security appliances
Google has issued a lawsuit against BT in both the US and the UK over what it claims is an infringement of its patents. In 2011, BT launched its own legal action against Google for infringing six of its patents in a US court in Delaware. ...
Tags: Google, BT, infringement
The maker of the Path social networking app will pay a $800,000 civil penalty to settle U.S. Federal Trade Commission charges that it illegally collected personal information from children without parental consent, the agency said Friday. ...
Tags: Path social networking app, U.S.Federal Trade Commission