Three widely deployed payment terminals have vulnerabilities that could allow attackers to steal credit card data and PIN numbers, according to a pair of security researchers from penetration testing firm MWR InfoSecurity in the U.K. The ...
Tags: payment terminals, MWR InfoSecurity, credit card data, PIN numbers
The hacker group that recently infected Israeli police computers with the Xtreme RAT malware has also targeted government institutions from the U.S., U.K. and other countries, according to researchers from antivirus vendor Trend Micro. ...
Tags: hacker group, Xtreme RAT malware, U.S., U.K.
Malware attacks seem to be evolving. The traditional viruses, Trojan horses, botnets and phishing attacks are still a threat, but the next generation malware takes insidious to a whole new level. Thankfully, theres a silver lining as well. ...
Tags: Malware, attacks, traditional viruses, Trojan horses, botnets
A new piece of malicious software targeted at Apple users has been found on a website dedicated to the Dalai Lama, but one security vendor is labeling it as low risk. The malware, nicknamed "Dockster," is a backdoor that allows an ...
Tags: malicious software, Apple users, website, Dalai Lama
Enterprise IT security professionals faced increasingly sophisticated, stealthy and dynamic threats in 2012, but numerous surveys revealed that knowledge and understanding of the latest attack techniques are lacking in many organisations. ...
Tags: IT security, user security awareness, IT industry, cyber
The recently launched Adobe Reader and Adobe Acrobat XI come with new security features and an improved sandbox that will make the products harder to attack and exploit, according to Adobe. The sandboxing feature known as the Protected ...
Tags: Adobe Reader, Adobe Acrobat XI, security features, sandbox
A security researcher claims that he found 23 vulnerabilities in industrial control software from several vendors after a different security company last week showcased vulnerabilities in applications from some of the same manufacturers, ...
Tags: security researcher, vulnerabilities, industrial control software
Less than 5% of the top 40 antivirus systems are able to detect previously non-cataloged viruses initially, a study has revealed. A test by security firm Imperva, which used more than 80 previously non-catalogued viruses, showed that many ...
Tags: antivirus systems, Enterprise security, Antivirus solutions
Microsoft is hardening security certificates as part of this month's Patch Tuesday update, which includes nine fixes. In the Microsoft TechNet security blog, Yunsun Wee, director of Microsoft Trustworthy Computing wrote: "Today we are ...
Tags: Microsoft, security certificates, IE patch, document handling
Spammers have found a way to abuse a URL shortener service destined for U.S. government social media activities in order to craft rogue .gov URLs for work-at-home scams. Security researchers from Symantec have detected a new email spam ...
Tags: Spammers, URL shortener service, U.S.government, social media activities
An exploit for an unpatched vulnerability in the Microsoft XML Core Services (MSXML) has been incorporated into Blackhole, one of the most widely used Web attack toolkits, according to security researchers from antivirus firm Sophos. The ...
Tags: vulnerability, Microsoft, MSXML, Blackhole, Web attack toolkits
Security researchers have collaborated to take down Grum, the world's third-largest botnet of hijacked computers. The Grum botnet is believed to have been responsible for around 18% of global spam, or 18 billion spam messages a day. ...
Tags: Security Researchers, Grum, hijacked computers, global spam, spam messages
IDG News Service - Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6 -- in order to infect computers with malware, according to researchers from security vendor FireEye. ...
IDG News Service - Java vulnerabilities are increasingly exploited by attackers to infect computers, and the problem could become worse if Oracle doesn't do more to secure the product and keep its installation base up to date, according to ...
Tags: Java vulnerabilities, computers, Oracle, Flash Player, Adobe Reader
IDG News Service - Cybercriminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. ...
Tags: Cybercriminals, computer, malware, commercial proxy service