Iran’s national CERT has warned of a new type of data-wiping malware that bears some of the hallmarks of a cyberattack that severely disrupted the country’s oil industry earlier this year. The exact nature of the latest attack ...
Tags: Cyberattack, Oil Hit, Computer Products
New configurations of the Shylock financial malware inject attacker-controlled phone numbers into the contact pages of online banking websites, according to security researchers from antivirus vendor Symantec. By doing this, the attackers ...
Tags: Shylock financial malware, phone numbers, contact pages
Intel hopes security features from McAfee will help the company differentiate its mobile chips from its rivals', according to Intel's software chief Renee James. The security threats posed to handheld devices are escalating, and chip ...
Tags: Intel, ecurity features, McAfee, mobile chips
Researchers from security vendor Damballa have identified malicious Internet traffic that they believe is generated by a new and elusive variant of the sophisticated TDL4 malware. The new threat, which has been assigned the generic name ...
Tags: TDL4 malware, Internet traffic, elusive variant, Fortune 500 Companies
Attackers can abuse Facebook's phone search feature to find valid phone numbers and the names of their owners, according to security researchers. The attack is possible because Facebook doesn't limit the number of phone number searches ...
Tags: Facebook, phone search feature, valid phone numbers, security researchers
In a new twist, spammers have built a botnet that sends SMS spam through infected Android phones, shifting the potentially pricey cost of sending spam to victims. The trend, spotted by security vendor Cloudmark, poses a new challenge ...
Tags: spammers, a mobile spam campaign, spam messages, Android
Sourcefire announced today it has strengthened and expanded its FirePOWER appliance family, providing users with the unmatched ability to protect against sophisticated malware, advanced persistent threats (APTs) and targeted attacks. One ...
Tags: advanced malware protection, advanced persisted threats, APT, firepower
Adobe Systems released fixes on Tuesday for six critical vulnerabilities affecting its Flash multimedia application and AIR runtime, five of which could allow for remote code execution on a system. The updates affect Windows, Macintosh, ...
Tags: Adobe Systems, critical vulnerabilities, Flash multimedia app
A buggy update released Friday by security vendor McAfee for its consumer and enterprise antivirus products, left the computers of its customers unprotected and, in some cases, unable to access the Internet. The incident affected both ...
Tags: McAfee Antivirus, consumer, enterprise, antivirus products
Dell has made a deal to acquire data-protection vendor Credant Technologies and plans to add the company's technology to its enterprise IT security offerings. The companies did not disclose the terms of the deal.Credant,founded in 2001,is ...
Tags: Dell, Credant, acquisitions, IT security offering
When malware infects a machine it usually goes after the system software. But in a rare case worked on by SpiderLabs, researchers found a Trojan that had been infected by a virus, leaving both still functioning as normal. The two pieces ...
Tags: malware, system software, SpiderLabs, Trojan, virus
The 'CRIME' attack announced last week exploits the data compression scheme used by the TLS (Transport Layer Security) and SPDY protocols to decrypt user authentication cookies from HTTPS (HTTP Secure) traffic, one of the attack's creators ...
Tags: CRIME attack, data compression scheme, TLS, SPDY protocols, HTTPS
Security researchers have proposed several methods for users to protect their computers from ongoing attacks that target a new and yet-to-be-patched vulnerability in all versions of Java Runtime Environment 7. Most of the proposed ...
Tags: security researchers, methods, ongoing attacks, vulnerability, Java
Microsoft has fixed 26 vulnerabilities in its software products, including several considered critical, the company said on Tuesday in its monthly security patch report. The security holes, described in five critical and four important ...
Tags: Microsoft, vulnerabilities, software products, Windows, Office, IE
Crossbeam has been bought by private equity firm Thoma Bravo, opening up the door for the security company to expand its product line both in-house and via acquisitions. Known for its high-end X-Series hardware that supports software of ...
Tags: Blue Coat, BT, cloud, Crossbeam, Crossbeam bought