Researchers from Israel-based IT security firm Seculert have uncovered a custom-made piece of malware that infected hundreds of point-of-sale (PoS) systems from businesses in 40 countries in the past few months and stole the data of tens of ...
Tags: data, dexter, highlightedpost, israel, malware, POS, research, seculert
Security experts are warning businesses to take the publication of encrypted LinkedIn passwords by a hacker seriously. The professional networking site has confirmed that "some" of the stolen passwords posted online by a hacker correspond ...
Tags: security experts, businesses, LinkedIn passwords, hacker
It has been reported that detectives from the Police Central e-Crime Unit (PCeU) have arrested three people in connection with using ransomware to blackmail people. It has been alleged that computer users were targeted and led to believe ...
Tags: PCeU, ransomware, blackmail people
IDG News Service-Microsoft launched a new anti-piracy campaign in China to highlight the security risks of buying counterfeit software. In a recent investigation,Microsoft purchased 169 PCs from shops in China and found that all were ...
Tags: software, Microsoft, software market, Business Software Alliance
Cybercriminals are using a new PDF exploit that bypasses the sandbox security features in Adobe Reader X and XI, in order to install banking malware on computers, according to researchers from Russian security firm Group-IB. The zero-day ...
Tags: PDF, Cybercriminals, Adobe Reader, Group-IB
CSO-In Windows 8,Microsoft has greatly improved the operating system's ability to detect malware before it has a chance to run,experts say.Windows 8 should also make it more difficult for people to unknowingly install malware in the first ...
IDG News Service-Security researcher Zoltan Balazs has developed a remote-controlled piece of malware that functions as a browser extension and is capable of modifying Web pages,downloading and executing files,hijacking accounts,bypassing ...
Tags: malware, browser extension, remote-controlled, Balazs
McAfee Data Protection has pledged to invest heavily in social engineering and so-called 'wetware' (meaning human-focused) technologies in order to protect users from a continual increase in social network-based spoofing and false link ...
Tags: McAfee, social engineering, wetware, Michael DeCesare
An international gang of cyber crooks is plotting a major campaign to steal money from the online accounts of thousands of consumers at 30 or more major U.S.banks,security firm RSA warned. In an advisory Thursday,RSA said it has ...
Tags: Cybercriminal, Trojan Attack, international gang of cyber crooks, RSA
Despite an increasing number of successful cyberattacks launched by East Asian hackers against companies and government institutions around the world in recent years,Eastern European cybercriminals remain a more sophisticated threat to the ...
Hackers are distributing rogue email notifications about changes in Microsoft's Services Agreement to trick people into visiting malicious pages that use a recently circulated Java exploit to infect their computers with malware. "We're ...
Tags: Malware, Vulnerabilitie, rogue email notification, malicious email
Cybercriminals have found a way to circumvent the multifactor authentication systems used to protect business VPNs,according to security firm Trusteer,which has reported a recent targeted attack on an airport network using this method. ...
Tags: Cybercriminals, VPN, Trusteer, security, OTP, authentication system, Citadel
Government-sponsored cybercriminals are using hacking techniques to steal commercial secrets from businesses,KPMG has warned. Confidential information,including product designs and bid documents,are at risk from states seeking to win ...
Tags: Government-sponsored cybercriminals, hacking techniques
The number of phishing websites detected reached an all-time high earlier this year, a sign that making fake websites spoofing real ones is still a lucrative trade for cybercriminals. In its latest report, the Anti-Phishing Working Group ...
Tags: Malware, Vulnerabilities, phishing website, APWG
Ancient military wisdom dictates that defenders need to know themselves as well as their enemy, and this can be applied to defending information security today, says security firm Websense. In building effective IT defences, businesses ...
Tags: information security, Websense, IT defences, Hacker Attack