The creation of Android malware is now mature enough for there to be development cycles that mimic those of the legitimate software world, a report from Juniper Networks has concluded. According to the?firm's annual survey of the ...
Tags: Android, Software, Commercial Software, Computer Products
LinkedIn's domain name was temporarily redirected to a third-party server Thursday, which resulted in a service outage and potentially put user accounts at risk of compromise. Uptime monitoring service Pingdom recorded that LinkedIn was ...
Microsoft has posted bounties of up to $US100,000 ($106,000) for "truly novel" ways to hack the latest version of its Windows software for powering computers. "For the first time ever, Microsoft is offering direct cash payouts in exchange ...
Tags: Microsoft, Hacking Bountries
Sony's gaming division pulled its latest firmware update for the PlayStation 3 Wednesday, after widespread reports that installing it could render the console useless. Gamers took to Twitter and online forums such as Reddit to spread word ...
Tags: Sony, PS3, Bricks Consoles
Last week's attack on the Virgin Radio Dubai website could have provided cyber-criminals with a springboard from which to launch targeted attacks, according to a researcher from Kaspersky Lab. The popular music station's website was taken ...
Tags: Computer Products
A hacker has apparently taken down the Virgin Radio Dubai website. The hacker, who goes by the username @OxAlien on Twitter, posted up a picture of his screen as he was apparently removing the link to the website on Monday night. The ...
Tags: Virgin Radio Dubai, Database, Hacker
Despite the growing threat of state-sponsored cyberattacks launched from China and other countries, U.S companies should not be allowed to fight back on their own, security experts say. Such corporate counterstrikes would undermine ...
Tags: Computer Products, web surcrity
Threats from malware specifically targeting social media and the number of spam emails have both risen significantly in the first quarter of this year. That's according to the McAfee Threats Report: First Quarter 2013, which reveals that ...
Tags: Social Media Malware, McAfee
Google threw the gauntlet down before the software industry to clean up its mistakes faster than has been done in the past. Critical vulnerabilities in software programs being actively exploited by hackers should be made public seven days ...
Add LinkedIn to the list of Internet companies trying to make themselves safer from cyberattacks by adding two-step authentication. Users of the professional social-networking site now have the option to add two-step verification to their ...
Buried in a 100-page report issued last week by the Commission on the Theft of American Intellectual Property was a recommendation to copy a tactic cyber scammers use to extort money from innocent victims. The IP Commission -- a private ...
Tags: Computer Products, software
Jeremy Hammond, the hacker accused of breaking into global foreign-intelligence company Stratfor's systems and stealing information later posted to Wikileaks, has pleaded guilty to the charges and now faces 10 years in jail. Caught in ...
Tags: Computer Products, software
Buried in a 100-page report issued last week by the Commission on the Theft of American Intellectual Property was a recommendation to copy a tactic cyber scammers use to extort money from innocent victims. The IP Commission – a ...
Tags: Computer Products
Twitter's SMS-based, two-factor authentication feature could be abused to lock users who don't have it enabled out of their accounts if attackers gain access to their log-in credentials, according to researchers from Finnish anti-virus ...
Tags: Computer Products, software
Hackers are actively exploiting a critical vulnerability in the Ruby on Rails Web application development framework in order to compromise Web servers and create a botnet. The Ruby on Rails development team released a security patch for ...
Tags: Ruby on Rails, Hacker, Botnet