Microsoft claims Windows 8 is"a better Windows"than Windows 7.In particular,the company has focused on improving security to ensure users of Windows 8 tablets can securely connect to corporate networks. It is building antivirus(AV)and ...
Three widely deployed payment terminals have vulnerabilities that could allow attackers to steal credit card data and PIN numbers, according to a pair of security researchers from penetration testing firm MWR InfoSecurity in the U.K. The ...
Tags: payment terminals, MWR InfoSecurity, credit card data, PIN numbers
The hacker group that recently infected Israeli police computers with the Xtreme RAT malware has also targeted government institutions from the U.S., U.K. and other countries, according to researchers from antivirus vendor Trend Micro. ...
Tags: hacker group, Xtreme RAT malware, U.S., U.K.
A new variant of a Trojan program called Reveton that prevents victims from using their computers and displays rogue messages from law enforcement agencies is using localized voice messages to trick victims into paying made-up fines, ...
Tags: Reveton, victims, computers, displays, antivirus vendor, Trend Micro
The last member of a US cybercrime trio that netted up to $3m in a Wi-Fi and malware hacking spree has been sentenced. Joshuah Allen Witt, 35, John Earl Griffin, 36, and Brad Eugene Lowe, 39, have all now been given stiff prison terms. ...
Tags: Hacker, Hacking Spree, Computer Products
Spammers have found a way to abuse a URL shortener service destined for U.S. government social media activities in order to craft rogue .gov URLs for work-at-home scams. Security researchers from Symantec have detected a new email spam ...
Tags: Spammers, URL shortener service, U.S.government, social media activities
The industry that you expect to hit the IT headlines on a regular basis has not let us down in the last 12 months,despite continued tough market conditions. With customer demands changing,banks have to innovate around things like mobile ...
Tags: Financial Services, IT, bank, mobile banking, Barclays, RBS
CoDeSys, a piece of software running on industrial control systems (ICS) from over 200 vendors contains a vulnerability that allows potential attackers to execute sensitive commands on the vulnerable devices without the need for ...
Tags: CoDeSys, software, ICS, vulnerability
A variation of the recently disclosed attack that can wipe data from Samsung Android devices when visiting a malicious Web page can also be used to disable the SIM cards from many Android phones, researchers say. Ravishankar Borgaonkar, a ...
Tags: USSD, SIM Cards, Samsung, Android Devices
Normally if you find a rogue outlet strip, or a user happens to bring his or her own surge protector to use you might not think much of it. Thanks to a new device called the Power Pwn, though, it might soon be cause for concern. A company ...
Tags: outlet strip, surge protector, Power Pwn, hacking tool
Amazon is urging people to switch off a safety feature in Android, which prevents rogue apps from being downloaded, to install its own Appstore software. The online retailer has introduced its app store rival to Google Play in the UK and ...
Tags: Amazon, rogue apps, Appstore software, Amazon Appstore
Facebook has begun warning users whose computers are infected with the DNSChanger malware, a variant of the Zlob family of Trojans. The malware is designed to tell the infected computer to use a rogue Domain Name System (DNS) server, ...
Tags: Facebookm, computer security, DNSChanger malware, Trojans
Monday, 9 July, was supposed to be 'Internet Doomsday' when the US' Federal Bureau of Investigation (FBI) was to shut down servers associated with the DNSChanger malware. As a result, computers infected with this threat were to be cut off ...
Tags: USA, DNSChanger malware, FBI, computer
The Information Commissioner's Office (ICO) investigated the men following complaints from consumers, and has put an additional eight companies on notice that they face action, including fines if it is proved they are sending out unwanted ...
Tags: ICO, unsolicited marketing messages, company news, information
New configurations of the Shylock financial malware inject attacker-controlled phone numbers into the contact pages of online banking websites, according to security researchers from antivirus vendor Symantec. By doing this, the attackers ...
Tags: Shylock financial malware, phone numbers, contact pages