A security scare for Microsoft users hit late yesterday, after vulnerability management company Rapid7's Metasploit penetration tool project discovered an Internet Explorer exploit that is said to affect all browsers earlier than IE9, and ...
Free mobile apps pose a serious threat to privacy because of their ability to capture large amounts of user information, a study has revealed. Free mobile applications are 401% more likely to track user location and 314% more likely to ...
Tags: free mobile apps, Juniper Networks, information, applications
Google has introduced stricter rules for applications on its Android mobile operating system to reduce the number of malicious apps in the Google Play app market and improve its reputation. The revised Google Android developer policy ...
Tags: Google, Android Policy, Malicious Apps, Google Play app
The second quarter of 2012 saw the biggest increase in malware samples detected in the past four years, says security firm McAfee. Researchers detected a 1.5 million sample increase in malware since Q1 2012, according to the firm’s ...
Tags: McAfee, malware spike, Computer Products
Security researchers have collaborated to take down Grum, the world's third-largest botnet of hijacked computers. The Grum botnet is believed to have been responsible for around 18% of global spam, or 18 billion spam messages a day. ...
Tags: Security Researchers, Grum, hijacked computers, global spam, spam messages
IDG News Service - Cybercriminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. ...
Tags: Cybercriminals, computer, malware, commercial proxy service
IDG News Service - One of the world's most active spam botnets -- Grum -- was crippled after two of its command and control (CnC) servers hosted in the Netherlands were taken down, according to researchers from security firm FireEye. ...
Tags: spam botnets, Netherlands, FireEye, security
IDG News Service - Google on Thursday dismissed the possibility that a new wave of pharmacy, penny stock and e-card spam emails are being sent by Android spam botnets. "Our analysis suggests that spammers are using infected computers and ...
Tags: Google, pharmacy, penny stock, spam email, computers
Medical devices often use commercial PCs and have wireless connections that make them vulnerable to malware, or require software updates for security, but the U.S. may not be doing an adequate job tracking these risks, researchers ...
Tags: Medical-Device Security, security IT, malware, computer technology
A 30-year-old Phoenix man was sentenced Thursday to 30 months in prison for using botnets and selling access to them, the U.S. Department of Justice announced. Joshua Schichtel, allegedly connected to a group of hackers who used ...
Tags: Phoenix man, botnets, U.S.Department of Justice, Arizona
Monday, 9 July, was supposed to be 'Internet Doomsday' when the US' Federal Bureau of Investigation (FBI) was to shut down servers associated with the DNSChanger malware. As a result, computers infected with this threat were to be cut off ...
Tags: USA, DNSChanger malware, FBI, computer
A perplexing risk has emerged for parents, as kids are drawn into chat rooms, online commerce, and submitting private data to join groups of "friends" they have never met, undermining traditional safety precautions of American families. ...
Tags: risk, online commerce, chat rooms, groups of"friends"
Security researcher Michael Coppola demonstrated how small and home office (SOHO) routers can be compromised and turned into botnet clients by updating them with backdoored versions of vendor-supplied firmware. Coppola, who is a security ...
Tags: SOHO routers, botnet clients, backdoored versions, firmware
Researchers from security vendor Damballa have identified malicious Internet traffic that they believe is generated by a new and elusive variant of the sophisticated TDL4 malware. The new threat, which has been assigned the generic name ...
Tags: TDL4 malware, Internet traffic, elusive variant, Fortune 500 Companies
Attackers can abuse Facebook's phone search feature to find valid phone numbers and the names of their owners, according to security researchers. The attack is possible because Facebook doesn't limit the number of phone number searches ...
Tags: Facebook, phone search feature, valid phone numbers, security researchers