Evidence collected from a website that was recently used to flood U.S. banks with junk traffic suggests that the people behind the ongoing DDoS attack campaign against U.S. financial institutions — thought by some to be the work of ...
Tags: bank attacks, botnets for hire, cyber attacks, Homeland Security, Iran
Microsoft has released a quick fix for a vulnerability in older versions of its Internet Explorer browser that is actively being used by attackers to take over computers. The vulnerability affects IE versions 6, 7 and 8. The latest ...
Tags: Microsoft, quick fix, vulnerability, IE
IDG News Service - A tool for testing if web application firewalls (WAFs) are vulnerable to around 150 protocol-level evasion techniques was released at the Black Hat USA 2010 security conference on Wednesday. The tool and the research ...
Tags: web application firewalls, Black Hat USA 2010, cyber security
IDG News Service-The notorious malware known as the Conficker worm still infects computers,a sort of wild horse with no rider,but investigators appear no closer to finding its creator. Also known as"Downandup,"Conficker was discovered in ...
Tags: conficker worm, notorious malware, evidence collection
IDG News Service - Researchers from security vendor AlienVault have identified a variant of a recently discovered Internet Explorer exploit that is used to infect targeted computers with the PlugX remote access Trojan (RAT) program. The ...
Tags: IE, malware, Internet Explorer, website
In a new twist, spammers have built a botnet that sends SMS spam through infected Android phones, shifting the potentially pricey cost of sending spam to victims. The trend, spotted by security vendor Cloudmark, poses a new challenge for ...
Tags: botnet, SMS spam, Android phones, victims
An increase in hacktivism and a greater prevalence of Advanced Evasion Techniques will form part of the backdrop of IT security in 2013, according to Stonesoft With 2013 just around the corner, it is time for IT security experts to reflect ...
Tags: Stonesoft, cyber threats, Evasion Techniques, IT security
Those popular mobile apps that everyone's buying from the official Android and Apple apps stores for business and fun are being torn apart by hackers who turn around and post these abused apps filled with malware, their content pirated or ...
Tags: mobile apps, Android, Apple, apps stores, malware
A new variant of a Trojan program called Reveton that prevents victims from using their computers and displays rogue messages from law enforcement agencies is using localized voice messages to trick victims into paying made-up fines, ...
Tags: Reveton, victims, computers, displays, antivirus vendor, Trend Micro
A new piece of malicious software targeted at Apple users has been found on a website dedicated to the Dalai Lama, but one security vendor is labeling it as low risk. The malware, nicknamed "Dockster," is a backdoor that allows an ...
Tags: malicious software, Apple users, website, Dalai Lama
IDG News Service - Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6 -- in order to infect computers with malware, according to researchers from security vendor FireEye. ...
Hackers using a Remote Access Trojan (RAT) named Mirage have been engaged in a systematic cyber espionage campaign against a Canadian energy company, a large oil firm in the Philippines and several other entities since at least this April, ...
Tags: Hackers, RAT, Mirage, systematic cyber espionage, energy company
Pacemakers from several manufacturers can be commanded to deliver a deadly, 830-volt shock from someone on a laptop up to 50 feet away, the result of poor software programming by medical device companies. The new research comes from ...
Tags: Pacemakers, shock, laptop, software programming, medical device companies
Microsoft has bought multi-factor authentication specialist PhoneFactor with the goal of integrating the company's technology into its cloud services and on-premises applications. PhoneFactor, based in Overland Park, Kan., sells ...
Tags: Microsoft, PhoneFactor, technology, cloud services, applications
The Olympic Games in London have sparked interest from fraudsters, with a raft of sites supposedly offering live video streams of events, according to security vendor Trend Micro. Trend Micro called out on Sunday more than a dozen sites ...
Tags: Fraudsters, Data Security, Olympic Games, London