AutoIt, a scripting language for automating Windows interface interactions, is increasingly being used by malware developers thanks to its flexibility and low learning curve, according to security researchers from Trend Micro and ...
Several media outlets in the Washington DC area have had their websites hacked and used to spread malware. WTOP, the largest radio station in the region, and Federal News Radio, along with the website of technology blogger John Dvorak ...
Tags: Media Websites, Cyber Attacks
A subdomain of a U.S. Department of Labor website appeared offline on Wednesday after an apparent hack that looks similar to a known China-based hacking campaign nicknamed DeepPanda. The tampered page, called Site Exposure Matrices (SEM), ...
Tags: Labor Website, Computer Products
It pays to be careful about which apps you download to your smart phone. More than 5 million smart phone users experienced symptoms of malicious software on their phones in the past year, our latest survey projects. Even a nonmalicious app ...
Tags: App, Consumer Electronics
Smart phones are fast replacing home computers for many daily online activities. But 39 percent of the more than 100 million American adult smart phone owners failed to take even minimal security measures to protect their phone, the latest ...
Tags: Smart Phone, Phone, Consumer Electronics
Mozilla sent a cease-and-desist letter on Tuesday to a European company that created a piece of spyware masquerading itself as the Firefox browser. The move comes after computer security researchers said Tuesday they discovered that a ...
Tags: Mozilla, Spoofing Firefox
Cybercriminals increasingly hack into shared Web hosting servers in order to use the domains hosted on them in large phishing campaigns, according to a report from the Anti-Phishing Working Group (APWG). Forty-seven percent of all ...
Tags: Hackers Target, Computer Products
Cyber criminals increasingly hack into shared Web hosting servers in order to use the domains hosted on them in large phishing campaigns, according to a report from the Anti-Phishing Working Group (APWG). Forty-seven percent of all ...
Tags: Hackers, Web Hosting Servers
McAfee said it has found a vulnerability in Adobe Systems' Reader program that reveals when and where a PDF document is opened. The issue is not a serious problem and does not allow for remote code execution,?wrote?McAfee's?Haifei Li in a ...
Tags: McAfee Spots, PDF-Tracking Flaw
A cybercriminal has taken to selling his malware and related services on Facebook, boldly choosing a public forum to reach potential customers over the secretive world of the online underground. RSA researchers?recently discovered?on the ...
Tags: Facebook, Computer Products
Taiwan-based technology firms will jointly fight against rising challenges from South Korean electronics giant Samsung Electronics Co. (SEC). People in the circle disclosed that SEC grew fast in the fields of smartphones, DRAM chips, and ...
Tags: taiwan, Consumer Electronics, Electrical
Bitcoin exchange Mt. Gox has temporarily shelved plans to support a competing currency, litecoin, the company said Thursday. Mt. Gox, which is the largest bitcoin exchange, has been battling ongoing distributed denial-of-service (DDoS) ...
A recently patched Java remote code execution vulnerability is already being exploited by cybercriminals in mass attacks to infect computers with scareware, security researchers warn. The vulnerability, identified as CVE-2013-2423, was ...
Tags: Computer Products, software
Java vulnerability hunters from Polish security research firm Security Explorations claim to have found a new vulnerability that affects the latest desktop and server versions of the Java Runtime Environment (JRE). The vulnerability is ...
Tags: Computer Products, software
The German firm AV-TEST today stood by the results of its search engine investigation that claimed Microsoft's Bing shows five times the number of malware-hosting websites than Google in its results. On Friday, Microsoft called AV-TEST's ...