China's remarkable success at infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology expertise. State-sponsored hacking ...
Tags: Computer Products, Hackers, networks
Previously unknown Mac OS X spyware, signed with a valid Apple Developer ID, has turned up on the laptop of an activist from Angola at a human rights conference in Norway. Security researcher and privacy activist Jacob Appelbaum found the ...
Tags: Computer Products, software
Security researchers from Trend Micro have uncovered an active cyberespionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and ...
Tags: Computer Products, software
The computer virus seems to be making a subtle comeback. The term virus is frequently used as a catch-all for malicious software, but actually describes a very specific type of program that infects files and replicates, noticeable ...
Tags: Computer Products, software
Security researchers from Trend Micro have uncovered an active cyber-espionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and ...
Security researchers from Damballa have found a new variant of the Pushdo malware that's better at hiding its malicious network traffic and is more resilient to coordinated takedown efforts. The Pushdo Trojan program dates back to early ...
Tags: Pushdo Botnet, Takedown Attempts
The Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused malware services, according to a report from Finnish security vendor F-Secure. The ...
Tags: Android, Computer Products
Security researchers from Russian cybercrime investigations firm Group-IB have uncovered a cyberfraud operation that uses specialized financial malware to target the customers of several major Australian banks. Over 150,000 computers, ...
Just 11 days after issuing an advisory, Microsoft has released a patch for a bug in Internet Explorer 8 that bedeviled the U.S. Department of Labor earlier this month. Microsoft's speedy release of this patch "is an outstanding example of ...
updates for its Reader, Acrobat, Flash Player and ColdFusion products on Tuesday to fix many critical vulnerabilities, including one that is already actively exploited by attackers. The Adobe Reader and Acrobat updates include fixes for ...
Tags: Adobe, Computer Products, Security Updates
Hackers are finding it pays to call ahead before sending malware-laden email. Symantec has seen what it describes as a sophisticated social engineering campaign aimed at French-speaking accounting and finance department employees. The ...
Tags: Malware, Computer Products
Colleges and universities are being encouraged to scrutinize their systems to keep them from being hijacked in DDoS (distributed denial-of-service) attacks. The Research and Education Networking Information Sharing and Analysis Center ...
Intruders used to creep in through ventilation ducts. Now they break in using the software that controls the ventilation. Hundreds of organizations across Australia are using out-of-date industrial control systems (ICS) to control the ...
Adobe has warned users of its ColdFusion application server platform of a critical vulnerability that could give unauthorized users access to sensitive files stored on their servers. The vulnerability is identified as CVE-2013-3336 and ...
Tags: Adobe, ColdFusion
A stealthy malicious software program is taking hold in some of the most popular Web servers, and researchers still don't know why. Last week, security companies Eset and Sucuri found Apache servers infected with Linux/Cdorked. If that ...
Tags: Web software, software, Computer Products