Cyber espionage is?nothing new.So a report from the Defense Security Service(DSS)about efforts in foreign countries to steal U.S.technology,intellectual property,trade secrets and proprietary information might sound like just more of the ...
Tags: Cyber espionage, DSS, Defense Industry
The Windows version of Crisis, a piece of malware discovered in July, is capable of infecting VMware virtual machine images, Windows Mobile devices and removable USB drives, according to researchers from antivirus vendor Symantec. Crisis ...
Tags: Windows version, crisis malware, VMware virtual machine, mobile devices
Cyber criminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. Three months ...
Tags: Black Market, malware, Proxy, Symantec, Computers
Several malicious Android apps designed to steal mobile transaction authentication numbers (mTANs) sent by banks to their customers over SMS (Short Message Service) were found on Google Play by researchers from antivirus vendor Kaspersky ...
Tags: Computer Products, Apps, SMS, Google Play
When malware infects a machine it usually goes after the system software. But in a rare case worked on by SpiderLabs, researchers found a Trojan that had been infected by a virus, leaving both still functioning as normal. The two pieces ...
Tags: malware, system software, SpiderLabs, Trojan, virus
Google's mobile operating system(OS),Android,has been targeted again by malicious malware,which causes the device to send out spam SMS messages. The infected malware,known as SpamSoldier,has been hiding in free versions of popular Android ...
Tags: Android, Malware, Attack, Google Play Store
IDG News Service - Project Blitzkrieg, a coordinated attack against U.S. banking customers allegedly planned for the spring of 2013, is a real and credible threat, security researchers at McAfee have said. A cybercriminal using the ...
Tags: Computer Products, Credible Threat, Mcafee, Blitzkrieg E Banking Heist
Cyber criminals are using compromised Twitter accounts to distribute messages disguised as coming from friends who suggest recipients click on a link to see themselves on a Facebook video. Sophos reported the trick after receiving a ...
Tags: Direct message virus, Facebook, LinkedIn, Malicious links, social media
With the advent of mobility and the influx of BYOD in enterprise, employers are struggling to keep control of their networks, according to John Yun, Director, Product Marketing, Blue Coat. Yun, who is in Dubai promoting Blue Coat’s ...
Tags: Blue Coat botnets, BYOD, cyber attacks, hackers
Apple has quietly hired Kristin Paget, a former Microsoft security expert who worked as a hacker for the company to resolve Windows Vista vulnerabilities, to work on its Mac OS X security team. According to her LinkedIn profile, Paget ...
Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain Dew, looking for public-facing IP addresses. When they found one, they enumerated the advertising services (Web server, ...
Cybercriminals are trying to capitalize on Adobe's decision to stop distributing Android Flash Player to new users via Google Play by creating malware and adware apps that masquerade as Flash Player installers. Since Aug. 15, Android ...
Tags: Cybercriminals, Adobe, Android Flash Player, Google Play
Microsoft has published evidence of an extraordinary conspiracy in which potent botnet malware was apparently installed and hidden on PCs during their manufacture in China. In ‘Operation B70′ started in August 2011, Microsoft ...
Tags: Microsoft, PC, Malware, backdoor malware
A computer worm that propagates by exploiting a 2010 Windows vulnerability is responsible for some of the recent incidents involving network printers suddenly printing useless data,according to security researchers from Symantec. Many ...
Tags: rogue printouts, Security Researchers, computer worm, Trojan program
Bank employees, not customers, are now the main target of financial cyber attacks, according to the FBI. In a warning issued earlier this week, it said the latest trend by cybercriminals is to get employee login credentials, using spam ...
Tags: BYOD, cyberattack, cybercrime, FBI, highlightedpost, risk, Trojan