An exploit for a previously unknown and currently unpatched vulnerability in Java is being used by cybercriminals to infect computers with malware, according to security researchers. An independent malware researcher who uses the online ...
Tags: exploit, unpatched vulnerability, Java, cybercriminals
The new European Cybercrime Centre (EC3) is to officially open on Friday, 11 January, at the European Police Office (Europol) in the Hague in the Netherlands. "The Cybercrime Centre will give a strong boost to the EU's capacity to fight ...
Tags: Cybercrime, internet, online crime, online communication
U.S. banks and their customers are doing a better job of protecting themselves against cyber attacks that result in thieves taking over commercial accounts, according to a survey released by the Financial Services-Information Sharing and ...
Tags: account takeovers, American Bankers Association, banks, cyber threats
The UK Defence Committee is urging the Government to be more vigorous in its approach to cyber threats. A new report released by the Committee says that the British military is now too dependent on information and communications ...
Tags: military, IT, cyber threats, information, communications technology
CSO - A researcher has bypassed Microsoft's temporary fix for a zero-day Internet Explorer browser vulnerability that hackers have been exploiting for a month. The exploit, developed by Peter Vreugdenhil of the vulnerability analysis ...
Tags: Microsoft, IE, Windows XP system, computer
Security researchers from antivirus vendor Trend Micro have uncovered a piece of backdoor-type malware that infects Java-based HTTP servers and allows attackers to execute malicious commands on the underlying systems. The threat, known as ...
Tags: security researchers, Trend Micro, Java, HTTP servers, malware
Some cloud providers fail to detect and block malicious traffic originating from their networks, which provides cybercriminals with an opportunity to launch attacks in a botnet-like fashion, according to a report from Australian security ...
Tags: cloud providers, botnets, cybercriminals, malicious traffic
Computerworld - Burlington, Wash. officials have notified hundreds of employees and residents that their bank account information was compromised last week when hackers broke into city systems and stole more than $400,000 from a city ...
Tags: Burlington, hackers, Bank of America, $400, 000, alert
U.S. law enforcement agencies with the help of Facebook have arrested 10 people from various countries in connection with international cybercrime rings that targeted users on the social network. The operation is said to have identified ...
A recent Java 7 update allows users to completely prevent Java applications from running inside browsers or to restrict how Web-based Java content is handled by the Java Runtime Environment (JRE) client. These features will benefit ...
Online dating site eHarmony has also been hit by the theft of millions of passwords,some of which professional networking site LinkedIn confirmed corresponded to members'accounts. The confirmation came after reports that 6.5 million ...
Malware attacks seem to be evolving. The traditional viruses, Trojan horses, botnets and phishing attacks are still a threat, but the next generation malware takes insidious to a whole new level. Thankfully, theres a silver lining as well. ...
Tags: Malware, attacks, traditional viruses, Trojan horses, botnets
A new variant of a Trojan program called Reveton that prevents victims from using their computers and displays rogue messages from law enforcement agencies is using localized voice messages to trick victims into paying made-up fines, ...
Tags: Reveton, victims, computers, displays, antivirus vendor, Trend Micro
Google, Microsoft and Yahoo have remedied a cryptographic weakness in their email systems that could allow an attacker to create a spoofed message that passes a mathematical security verification. The weakness affects DKIM, or DomainKeys ...
Tags: Google, Microsoft, Yahoo, cryptographic weakness, email systems
Public Wi-Fi is beginning to find its way into every corner of the UK. It is no longer the domain of the American-style coffee shop, with pubs, retailers and even theme parks offering their own connections. However, this is not enough for ...
Tags: Public WiFi, UK, data hungry devices, network