Details have emerged of an extraordinary attack in which millions of DSL broadband routers in Brazil were hit by a serious software flaw that allowed criminals to gain complete control of all web traffic running through them. First ...
Tags: Broadcom chipset, cyber attacks, DNS, malware, broadband routers
A ‘troll’ arrested on suspicion of aiming a torrent of abuse at a fellow Facebook user has been identified as a 32-year-old policeman from the UK, it has been revealed. Nicola Brookes, 45, from Brighton, UK was targeted ...
Tags: Arrested troll, Cyber bullying, Facebook abuse, Facebook troll, Facebook
A U.K. analytics firm that warned earlier this week of an information leak in Internet Explorer (IE) today rebuked Microsoft for downplaying the bug. Microsoft, however, has announced it is working on a fix, although the nature of the ...
Tags: Computer Products, Mouse Tracking, Microsoft, IE
Attackers can abuse the way browsers and other applications handle steam:// protocol URLs in order to exploit serious vulnerabilities in the Steam client or games installed through the platform, according to researchers from startup ...
Tags: attackers, browsers, applications, URL, vulnerabilities
IDG News Service - Project Blitzkrieg, a coordinated attack against U.S. banking customers allegedly planned for the spring of 2013, is a real and credible threat, security researchers at McAfee have said. A cybercriminal using the ...
Tags: Computer Products, Credible Threat, Mcafee, Blitzkrieg E Banking Heist
IDG News Service - Some of the distributed denial-of-service (DDoS) attacks that targeted the websites of U.S. financial institutions this week have peaked at 60 Gbps, according to researchers from DDoS mitigation provider Arbor Networks. ...
Tags: Ddos, Banks, Computer Products, U.S.Banks
A federal judge has rejected BancorpSouth's plan to use contractual agreements with customers as a shield against liability claims stemming from an online heist of some $440,000 that was illegally wire-transferred from the account of one of ...
Tags: federal judge, BancorpSouth, online heist
Attackers using two recently-uncovered Java unpatched vulnerabilities, or "zero-days," have quickly expanded their reach by going mainstream, security experts said today. And on Tuesday, Mozilla, maker of Firefox, joined the chorus of ...
Tags: Java, unpatched vulnerabilities, mainstream, security experts
China and the U.S. were the two largest sources of Internet-attack traffic in the first quarter of 2012, increasing to account for 16% and 11% respectively, according to Akamai Technologies. Attack traffic from China increased three ...
Tags: China, U.S., internet attacks, the first quarter of 2012
A new tool allows Mac OS X attackers with root OS access to easily steal the keychain password data of logged in users and reinforces the dangers of granting administrative privileges to applications without serious consideration. The ...
Tags: Apple, hackers, Keychain data, Mac OS X
Microsoft has fixed 26 vulnerabilities in its software products, including several considered critical, the company said on Tuesday in its monthly security patch report. The security holes, described in five critical and four important ...
Tags: Microsoft, vulnerabilities, software products, Windows, Office, IE
In a cryptic statement during the launch of Nokia Windows Phone 8 smartphones this week, Nokia’s CEO Stephen Elop might have tipped the company’s hand about developing tablets. If the company does make a Windows 8 tablet, it ...
Tags: Nokia, Windows 8, Microsoft, smartphone, tablet
BitDefender Labs has discovered Android malware that regularly broadcasts the location of the infected mobile device to a remote server. What the malware creators intend to do with the privacy-invading information is not clear. The app ...
Tags: Android malware, infected mobile device, remote server
The problem of ransom malware has reached epidemic proportions and could be extracting fraudulent payments from as many as 3 percent of victims, a Symantec report has calculated. In a world already afflicted by botnets, banking Trojans ...
Tags: botnet, cyber security, cybercrime, malware, Malware ransome, profits
Ireland top least-malware-infected nations for the first time PandaLabs, Panda Security's antimalware laboratory, today published its Quarterly Report for Q3, analyzing the IT security events and incidents from July through September ...