The number of mobile malware apps has jumped 614 percent in the last year, according to studies conducted by McAfee and Juniper Networks. The Juniper study – its third annual Mobile Threats Report – showed that the majority of ...
Tags: Computer Products, Mobile Malware
IDG News Service - A simple piece of malicious software is circulating that steals Litecoins, a virtual currency based on the Bitcoin system. Security vendor ESET wrote the malware infects Windows computers. The program tries to steal ...
Tags: Computer Products, software, network
Over three quarters of Android threats are malicious apps that send SMS messages to premium rate numbers and could be mitigated by a protection feature present in Android 4.2, according to researchers from networking vendor Juniper ...
Tags: Android Threats, Apps, Android 4.2
A recent targeted attack that used Chinese malware compromised over 1,000 computers belonging to dozens of South Korea organizations, according to researchers from Israeli security firm Seculert. The main malware tool used in the attack ...
LinkedIn's domain name was temporarily redirected to a third-party server Thursday, which resulted in a service outage and potentially put user accounts at risk of compromise. Uptime monitoring service Pingdom recorded that LinkedIn was ...
SAP has significantly improved the security of its products over the past few years but many of its customers are negligent with their deployments, which exposes them to potential attacks that could cripple their businesses, according to ...
Tags: SAP Security, HTTP Services
Java continues to be Public Enemy No. 1 when it comes to computer and network security. Oracle released a huge update for the virtually ubiquitous software, but attackers aren’t done exploiting Java as the weakest link in the security ...
Tags: Java Update, Oracle
Wall Street plans to hold a simulated cyber-attack against equity markets this month that experts hope will set an example of how industries should test their defences against assailants. Called Quantum Dawn 2, the drill will involve big ...
Tags: Wall Street, Security Defences
A newly discovered Trojan program exploits previously unknown flaws in Android and borrows techniques from Windows malware in order to evade detection and achieve persistence on infected devices. Security researchers from antivirus firm ...
Android smartphones and tablets are under attack, and the most popular tools developed to protect them are easily circumvented, according to new research from Northwestern University and the University of North Carolina. The researchers ...
Tags: Computer Products
The Internet Systems Consortium (ISC), the organization that develops and maintains the widely used BIND DNS (Domain Name System) software, has patched a publicly disclosed vulnerability that can be used to remotely crash DNS servers ...
Tags: Computer Products
The number of malware samples that use P-to-P (peer-to-peer) communications has increased fivefold during the past 12 months, according to researchers from security firm Damballa. The largest contributors to this increase are advanced ...
Distributed denial-of-service (DDoS) attacks that could be related have in the past few days slammed the DNS servers of at least three providers of domain name management and DNS hosting services. DNSimple, easyDNS and TPP Wholesale all ...
Tags: DDoS Attacks, DNS
An ongoing cyberespionage campaign compromised over 350 high-profile victims from more than 40 countries over the past eight years, including political activists, research centers, governmental institutions, embassies, military contractors ...
BT, one of Yahoo's biggest customers for its Yahoo Mail service, has decided to dump the service in favour of its own BT Mail platform, which will be run by US messaging specialist Critical Path. Yahoo Mail accounts have been given ...
Tags: BT, Yahoo, Account Hijackings