A piece of malware called Mahdi or Madi has been used to spy on hundreds of targets from Iran, Israel and a few other Middle Eastern countries during the past eight months, according to researchers from security vendors Seculert and ...
Tags: malware, Mahdi, Iran, Israel, Middle Eastern countries, computers
The Windows version of Crisis, a piece of malware discovered in July, is capable of infecting VMware virtual machine images, Windows Mobile devices and removable USB drives, according to researchers from antivirus vendor Symantec. Crisis ...
Tags: Windows version, crisis malware, VMware virtual machine, mobile devices
A new tool allows Mac OS X attackers with root OS access to easily steal the keychain password data of logged in users and reinforces the dangers of granting administrative privileges to applications without serious consideration. The ...
Tags: Apple, hackers, Keychain data, Mac OS X
About five years ago Genomic Health began to introduce cloud-based business applications. Ken Stineman, senior director of enterprise architecture and security, quickly became aware of the security risks these apps posed. CSO contributor ...
Tags: Genomic Health, cloud business applications, security, apps
The technique of using deception and manipulation to gain sufficient knowledge to dupe an unwary individual, employee or company into revealing personal information has the potential to be one of the biggest security threats in 2013 ...
Tags: big data, cloud, Gartner, social engineering, Windows
Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain Dew, looking for public-facing IP addresses. When they found one, they enumerated the advertising services (Web server, ...
The file-sharing utility Dropbox is now offering two-factor authentication, a system that makes it much harder for hackers to capture valid credentials for a person's account. Dropbox, one of the most widely used web-based storage ...
Tags: Dropbox, Security, Authentication
Many global organisations have failed to implement a data management strategy but will have to as IT leaders need to support big data volumes, velocity and variety, according to a new Gartner report. In its Predicts 2013: Big Data and ...
Security experts are warning businesses to take the publication of encrypted LinkedIn passwords by a hacker seriously. The professional networking site has confirmed that "some" of the stolen passwords posted online by a hacker correspond ...
Tags: security experts, businesses, LinkedIn passwords, hacker
It has been reported that detectives from the Police Central e-Crime Unit (PCeU) have arrested three people in connection with using ransomware to blackmail people. It has been alleged that computer users were targeted and led to believe ...
Tags: PCeU, ransomware, blackmail people
At a time when cyberattacks on America's critical infrastructure have increased 17-fold(between 2009 and 2011),the need for highly trained cybersecurity professionals is acute.However,83%of federal hiring managers in a recent survey said it ...
Unlicensed copies of popular software Keep up to date Patch applications with security updates Conficker still a threat Malicious key generation(keygen)software is one of the fastest-growing types of a malware,according to the latest ...
Tags: top cyber threats, malicious key, malicious keygen software
IDG News Service-Security researcher Zoltan Balazs has developed a remote-controlled piece of malware that functions as a browser extension and is capable of modifying Web pages,downloading and executing files,hijacking accounts,bypassing ...
Tags: malware, browser extension, remote-controlled, Balazs
McAfee Data Protection has pledged to invest heavily in social engineering and so-called 'wetware' (meaning human-focused) technologies in order to protect users from a continual increase in social network-based spoofing and false link ...
Tags: McAfee, social engineering, wetware, Michael DeCesare
Microsoft's Windows 8 is seen by many as representing an evolutionary jump for the operating system (OS), but what about security? Has there been an evolutionary leap there? In the run-up to the launch, much has been said about the new ...
Tags: Microsoft, Windows 8, operating system, user interface