Analyst firm A-V Comparative has released its November 2013 list of the antimalware programmes that do the best job of removing malware from an already infected system. What does this mean? As A-V Comparative notes, most PC users ...
Researchers have demonstrated that microphones and speakers built into laptops can be used to covertly transmit and receive data through inaudible audio signals. Michael Hanspach and Michael Goetz, two researchers from the Fraunhofer ...
Tags: Network Air Gaps, microphones, speakers
Eighty per cent of employees are potentially putting their companies at risk through use of unauthorised Software-as-a-Service (SaaS) applications on corporate networks. The extent of so-called "shadow IT" is revealed in a study for ...
A new type of Trojan horse computer virus could result in mass attacks on banks, exposing the personal details of an unprecedented number of online banking customers. Discovered by security software provider Kaspersky Labs, the Neverquest ...
Tags: warning, mass, Trojan, attack, against, online, bank, customer
Microsoft is planning end-to-end encryption of its internet traffic following concerns that the company had its network security breached as part of the National Security Agency's (NSA) internet surveillance programme. The revelation, ...
Tags: Microsoft, ramp up, encryption, combat, NSA, surveillance
A new Trojan programme that targets users of online financial services has the potential to spread very quickly over the next few months, security researchers warn. The malware was first advertised on a private cybercrime forum in July, ...
Tags: Online Banking, Threatonline, financial services, security
The UK's biggest companies are not considering cyber risks in their decision making, according to a new survey from the Department for Business, Innovation and Skills. The survey, dubbed the cyber governance health check, was sent by the ...
Tags: UK, FTSE, cyber risks, Government
The U.S. National Security Agency reportedly hacked into over 50,000 computer networks around the world as part of its global intelligence gathering efforts, and also taps into large fiber optic cables that transport Internet traffic ...
Tags: NSA, compromise, network, worldwide
Cybercriminals are increasingly using the “Blackshades” malware program whose source code was leaked three years ago, according to an analysis by Symantec. Blackshades, which Symantec identifies as “W32.Shadesrat,” ...
Tags: Symantec, Blackshades, malware
A new malicious software programme, advertised for sale on underground forums, claims to mine and steal bitcoins, according to a Danish security company. The Atrax malware is notable for its low US$250 price and use of TOR, short for The ...
The US National Security Agency (NSA) propagated malware around the world in a bid to infiltrate and compromise more than 50,000 networks. The claim is the latest in the Edward Snowden disclosures and published in the German newspaper ...
Tags: Computer Products, software
To help enterprises safeguard business data and set security policies for end-users at an affordable price, Kingston has announced the release of the DataTraveler Vault Privacy 3.0 (DTVP) secure USB Flash drive as well as the DataTraveler ...
The FBI has offered large rewards for information that could help them catch a clutch of alleged cyber-criminals. They include an El Salvadoran national accused of selling a Trojan designed to spy on husbands or wives believed by their ...
Malicious software aimed at stealing online banking credentials surged in the third quarter of this year to a level not seen since 2002, according to a new report from Trend Micro. The security vendor said it counted more than 200,000 new ...
Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in ...
Tags: IE, zero-day, hacker, watering hole