“Collecting more and more unstructured data will open up another whole degree of attractiveness and may well lead to attackers seeing value in a form not previously recognised by the organisation that owns the data.” So ...
The number of mobile malware apps has jumped 614 percent in the last year, according to studies conducted by McAfee and Juniper Networks. The Juniper study – its third annual Mobile Threats Report – showed that the majority of ...
Tags: Computer Products, Mobile Malware
The amount of cyber-criminal activity associated with the Zeus family of financial Trojan programs has increased during the past few months, according to security researchers from anti-virus vendor Trend Micro. “The notorious ...
Tags: anti-virus, banking, BitDefender, Bogdan Botezatu, Citadel, CNME
Security researchers from Trend Micro have uncovered an active cyber-espionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and ...
A new piece of custom malware sold on the underground Internet market is being used to siphon payment card data from point-of-sale (POS) systems, according to security researchers from antivirus vendor McAfee. Dubbed vSkimmer, the ...
Tags: vSkimmer, malware, Internet market
Software titan Microsoft and computer security giant Symantec sat they have smashed a hacker-infected computer network that was hijacking internet searches.
Tags: Microsoft, Symantec Smash Cyber Criminal, Computer Products
Cyber criminals have moved beyond the traditional PC, targeting Android, social media and even the Mac OS X with new attacks, according to Trend Micro’s 2012 Annual Roundup and Mobile Security reports. Malware targeting Android alone ...
Tags: cyber criminals, traditional PC, Android, social media
A 22-year-old U.K. man was convicted for his involvement in a series of distributed denial-of-service attacks launched by the hacktivist group Anonymous against PayPal, MasterCard, Visa and other companies in 2010. Christopher ...
Tags: attacks, Anonymous, PayPal, MasterCard, Visa
Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale online. In the past year, cyber criminals have used ...
Tags: Protection, Cyber Crime, Products
Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain Dew, looking for public-facing IP addresses. When they found one, they enumerated the advertising services (Web server, ...
Security researchers have presented proof-of-concept code capable of accessing the database driving a Microsoft ERP system and then diverting funds while avoiding immediate detection. Tom Eston and Brett Kimmel of vendor SecureState ...
Tags: highlightedpost, Microsoft, Microsoft ERP, Security researchers
Microsoft Windows 8 support for TPM Tipping point for TPM TPM gathers momentum The end of the password? TPM in action across all devices Since 2006, many new computing devices have been sold with a built-in trusted platform module ...
Tags: Microsoft Windows 8, TPM, password
Security researchers have presented proof-of-concept code capable of accessing the database driving a Microsoft ERP system and then diverting funds while avoiding immediate detection. Tom Eston and Brett Kimmel of vendor SecureState ...
The UK national Cyber Security Challenge has announced four face-to-face competitions for the next round of the current challenge. Cyber Security Challenge UK runs a series of national inspirational competitions aimed at attracting ...
Tags: Cyber Security Challenge, face-to-face competitions, cybersecurity
Many UK organisations are still failing to understand the implications of data breaches and estimate the costs of recovery accurately,a study has revealed. Of the UK companies that have not yet suffered a breach,58%told the Ponemon ...
Tags: data breaches, UK companies, breaches, cyber crime