Facebook has begun warning users whose computers are infected with the DNSChanger malware, a variant of the Zlob family of Trojans. The malware is designed to tell the infected computer to use a rogue Domain Name System (DNS) server, ...
Tags: Facebookm, computer security, DNSChanger malware, Trojans
Only 8% of European companies plan to decrease spending on antivirus and antimalware in 2013, a survey of IT security purchasing intentions has revealed. Some 21% of more than 250 IT professionals polled by Computer Weekly and TechTarget ...
Tags: European companies, antivirus, IT security, TechTarget
The UK Police Central e-Crime Unit (PCeU) has arrested three people in connection to using ransomware, which security experts say poses a threat to businesses as well as consumers. Ransomware is malicious software that is inadvertently ...
Tags: Ransomware, software, computer, blackmailers
Threat data Future of hardware-assisted security Why Intel bought McAfee Defence in isolation and containment Social media, cloud, big data and mobile apps Video: McAfee co-president Michael DeCesare on consumerisation and security The ...
Tags: hardware-assisted security, Intel, McAfee Defence, Social media, cloud
Monday, 9 July, was supposed to be 'Internet Doomsday' when the US' Federal Bureau of Investigation (FBI) was to shut down servers associated with the DNSChanger malware. As a result, computers infected with this threat were to be cut off ...
Tags: USA, DNSChanger malware, FBI, computer
IDG News Service - Adobe plans in February to close a dangerous hole in its Shockwave application that causes the application to be downgraded when a user launches older multimedia content, allowing hackers to target years-old ...
Tags: Adobe, close, dangerous hole, Shockwave application
Security researchers from Symantec have identified an information-stealing Trojan program that was used to infect computer servers belonging to various U.S. financial institutions. Dubbed Stabuniq, the Trojan program was found on mail ...
Iran’s national CERT has warned of a new type of data-wiping malware that bears some of the hallmarks of a cyberattack that severely disrupted the country’s oil industry earlier this year. The exact nature of the latest attack ...
Tags: Cyberattack, Oil Hit, Computer Products
An increasing number of vulnerability researchers will focus their attention on industrial control systems(ICS)in the year to come,but so will cyberattackers,security experts believe. Control systems are made up of supervisory software ...
Tags: SCADA security, ICS, critical infrastructure, control systems
Advanced malware that evades signature-based detection has increased nearly 400% in the past year, research by security firm FireEye has revealed. Companies are being hit by an average of 643 successful infections a week, according to the ...
Tags: FireEye, cyber attack, firewalls, intrusion prevention systems
The latest Java zero-day vulnerability is already available to users of the Metasploit tool and Blackhole exploit kit, say security researchers. The Java vulnerability allows attackers to use a custom web page to force systems to download ...
Tags: Metasploit tool, custom web, coded Java, security, FireEye
The creators of Carberp, a banking Trojan program used exclusively in Russian-speaking countries, have started to sell an improved version of the malware together with custom scripts that would allow cybercriminals to target U.S. online ...
Tags: Carberp Malware, Banks, Computer Products
With only a week left to go until Christmas, the iPad mini has been crowned the most looked-for festive gift of 2012. That is according to online shopping website PriceGrabber.co.uk, which based its findings on website analytics for 1 ...
Tags: Ipad Mini, Christmas Gift, Ipad, Consumer Electronics
New configurations of the Shylock financial malware inject attacker-controlled phone numbers into the contact pages of online banking websites, according to security researchers from antivirus vendor Symantec. By doing this, the attackers ...
Tags: Shylock financial malware, phone numbers, contact pages
Security researchers from Poland-based security firm Security Explorations claim to have discovered a vulnerability in the Java 7 security update released Thursday that can be exploited to escape the Java sandbox and execute arbitrary code ...
Tags: security researchers, Security Explorations, vulnerability, Java 7