Google yesterday made good on a promise from earlier this year and shipped Chrome 23 with the "Do Not Track" privacy feature. In September, Google added a Do Not Track (DNT) option to Chrome's precursor, the open-source Chromium, and ...
Tags: Google, Chrome 23, privacy feature, DNT option
Security researchers have collaborated to take down Grum, the world's third-largest botnet of hijacked computers. The Grum botnet is believed to have been responsible for around 18% of global spam, or 18 billion spam messages a day. ...
Tags: Security Researchers, Grum, hijacked computers, global spam, spam messages
Cyber criminals are using compromised Twitter accounts to distribute messages disguised as coming from friends who suggest recipients click on a link to see themselves on a Facebook video. Sophos reported the trick after receiving a ...
Tags: Direct message virus, Facebook, LinkedIn, Malicious links, social media
Facebook on Tuesday launched a feature that allows users to lock down their Facebook accounts and perform malware scans if they suspect that their computers might be infected. Facebook already uses internal scanners to detect spam and ...
Tags: Facebook, malware, infected computers
A new approach to mobile Internet protocols could improve the usability and reliability of mobile applications. At the annual Usenix tech conference last month in Boston, two MIT researchers formally unveiled a new protocol, and a remote ...
Tags: mobile Internet protocols, new approach, MIT
As many as 300,000 PCs and Macs will drop off the Internet in about 65 hours unless their owners heed last-minute calls to scrub their machines of malware. According to a group of security experts formed to combat DNSChanger, between a ...
Tags: Internet, PCs and Macs, infected computers
BitDefender Labs has discovered Android malware that regularly broadcasts the location of the infected mobile device to a remote server. What the malware creators intend to do with the privacy-invading information is not clear. The app ...
Tags: Android malware, infected mobile device, remote server
Disruption is the best way of tackling botnet-based cybercrime, according to Microsoft's Digital Crimes Unit (DCU). Taking down the Waledac botnet of hijacked computers in February 2010 was a proof-of-concept strategy that Microsoft and ...
Tags: Disruption, cybercrime, Microsoft, DCU
The ‘Shamoon’ malware that nixed the hard drives of 30,000 Saudi oil industry PCs in August was more of a ‘quick and dirty’ job by talented amateurs than a skilfully crafted professional cyberweapon, an analysis has ...
Tags: amatuers, cybercrime, cybercriminals, cyberwar, highlightedpost, Kaspersky
Criminals broke into an Adobe server and provided two pieces of malware with a digital certificate that attest to them being legitimate code. As a result of the breach, the company will revoke the certificate next Thursday and will update ...
Tags: Adobe, Criminal, cyber crime, highlightedpost, malware
Authorities in several countries have arrested a total of 10 people suspected of setting up a botnet of hijacked computers to steal personal information from millions of victims. The arrests were made in the UK, Bosnia and Herzegovina, ...
Tags: Authorities, Arrest, Thieves
IDG News Service-The Romanian domain names of Google,Yahoo,Microsoft,Kaspersky Lab and other companies were hijacked on Wednesday and were redirected to a hacked server in the Netherlands. The hijacking occurred at the DNS(Domain Name ...
Tags: Attackers hijack, hacked server, Netherlands, security breach
Computerworld-Wireless smartphone and tablet users helped both presidential candidates raise funds and support in 2012,while mobile computing contributed directly to President Barack Obama's edge in Tuesday's presidential election. Most ...
Tags: Obama, Smartphone, tablet users, presidential election
An international gang of cyber crooks is plotting a major campaign to steal money from the online accounts of thousands of consumers at 30 or more major U.S.banks,security firm RSA warned. In an advisory Thursday,RSA said it has ...
Tags: Cybercriminal, Trojan Attack, international gang of cyber crooks, RSA
Tesco.com,one of the biggest retail websites in the UK,is to be asked to explain the alleged poor security practices of its website to the Information Commissioner's Office(ICO). The inquiry follows investigations by security ...
Tags: ICO, retail websites, Android app, secure web page