Technology organisations are among the most frequently attacked by hackers, according to the latest ‘Advanced Cyber Attack Landscape’ report and interactive maps by FireEye. The report and maps provide detailed insight into ...
Tags: Tech Companies, Computer Products
A cybercriminal has taken to selling his malware and related services on Facebook, boldly choosing a public forum to reach potential customers over the secretive world of the online underground. RSA researchers?recently discovered?on the ...
Tags: Facebook, Computer Products
A recently patched Java remote code execution vulnerability is already being exploited by cybercriminals in mass attacks to infect computers with scareware, security researchers warn. The vulnerability, identified as CVE-2013-2423, was ...
Tags: Computer Products, software
Researchers from security firm Trusteer have found a new variant of the Gozi banking Trojan program that infects a computer's Master Boot Record (MBR) in order to achieve persistence. The Master Boot Record (MBR) is a boot sector that ...
Tags: Computer Products, software
Security researchers from Russian cybercrime investigations company Groub-IB have recently identified a new piece of malware designed to steal login credentials from specialized software used to trade stocks and other securities online. ...
Tags: Researchers, Trading Software
Apple on Tuesday patched Java for the aged OS X Snow Leopard and tweaked Safari to give users more control over what websites they let run the vulnerability plagued Oracle software. Oracle on Tuesday shipped an update for Java 6 and Java ...
According to a new security report released today by NQ Mobile Inc., a global provider of mobile Internet services, mobile malware threats increased 163 percent to more than 65,000 in 2012. The company warns, however, that the problem is ...
A U.S. House of Representatives subcommittee has voted to approve a bill that would make it official U.S. policy to promote an Internet "free from government control," with promises that the Republican majority would work with critics of ...
Security researchers from Kaspersky Lab have identified a spam message campaign on Skype that spreads a piece of malware with Bitcoin mining capabilities. Bitcoin (BTC) is a decentralized digital currency that has seen a surge in ...
Tags: CPU resources, Malware, Skype
The Department of Homeland Security (DHS) has a warning for organizations that post a lot of business and personal information on public web pages and social media sites: Don't do it. Phishers, the agency said in an alert this week, look ...
Tags: web pages, social media
Security researchers from Kaspersky Lab have identified a spam message campaign on Skype that spreads a piece of malware with Bitcoin mining capabilities. Bitcoin (BTC) is a decentralised digital currency that has seen a surge in ...
Tags: Skype, web service
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher. Ransomware is a class of malicious ...
Tags: Computer Products, software
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher. Ransomware is a class of malicious ...
Tags: Computer Products, software
A new piece of malware that infects point-of-sale (POS) systems has already been used to compromise thousands of payment cards belonging to customers of U.S. banks, according to researchers from Group-IB, a security and computer forensics ...
Tags: Computer Products, software
A new piece of malware that infects point-of-sale (POS) systems has already been used to compromise thousands of payment cards belonging to customers of U.S. banks, according to researchers from Group-IB, a security and computer forensics ...
Tags: POS malware, computer, net