Those involved in peddling counterfeit components have done their business with relative impunity. But the successful prosecution of a perpetrator in the US may mark the beginning of some law and order in the rampant illegal counterfeit ...
Tags: components, Electrical, Electronics
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data. Researchers from security firm Arbor Networks found two servers that were used ...
Tags: Computer Products, software
The website of a U.S. organisation specialising in national and international security policy was compromised with malware that targeted a previously unknown vulnerability in Internet Explorer. A nation-state looking to compromise the ...
Tags: Nation-state, attack, IE, flaw
Spear phishing is one of the most effective ways to break into a corporate network – and recent studies show that employees can be easily tricked on social media to provide the information needed to launch attacks. A phishing attack ...
Tags: Computer Products, software
Network Solutions is investigating an attack by a pro-Palestinian hacking group that redirected websites belonging to several companies. Owned by Web.com, Network Solutions registers domain names, provides hosting services and sells other ...
Tags: DNS Hijack, Network Solutions
The creation of Android malware is now mature enough for there to be development cycles that mimic those of the legitimate software world, a report from Juniper Networks has concluded. According to the?firm's annual survey of the ...
Tags: Android, Software, Commercial Software, Computer Products
A 17-year-old German student contends PayPal has denied him a reward for finding a vulnerability in its website. Robert Kugler said he notified PayPal of the vulnerability on May 19. He said he was informed by email that because he is ...
Tags: Computer Products, software
Security researchers from antivirus vendor ESET discovered a piece of cyberespionage malware targeting Tibetan activists that uses unusual techniques to evade detection and achieve persistency on infected systems. The malware, which was ...
Tags: Computer Products, software
Java, the popular OS-independent platform and programming language, runs on just about every kind of electronic device imaginable, including computers, cell phones, printers, TVs, DVDs, home security systems, automated teller machines, ...
Just 11 days after issuing an advisory, Microsoft has released a patch for a bug in Internet Explorer 8 that bedeviled the U.S. Department of Labor earlier this month. Microsoft's speedy release of this patch "is an outstanding example of ...
updates for its Reader, Acrobat, Flash Player and ColdFusion products on Tuesday to fix many critical vulnerabilities, including one that is already actively exploited by attackers. The Adobe Reader and Acrobat updates include fixes for ...
Tags: Adobe, Computer Products, Security Updates
Researchers from security firm Trusteer have found a new variant of the Gozi banking Trojan program that infects a computer's Master Boot Record (MBR) in order to achieve persistence. The Master Boot Record (MBR) is a boot sector that ...
Tags: Computer Products, software
Microsoft has discovered an unusually stealthy Trojan capable of deleting the files it downloads in order to keep them away from forensics investigators and researchers. The Trojan downloader,?called Win32/Nemim.gen!A, is the latest ...
Tags: Microsoft, Computer Products
A Chinese hacking ring, which has been active for four years, has been stealing data from players of more than 30 massively multiplayer online (MMO) role-playing games. That's according to research by security software vendor Kaspersky ...
Tags: Online Games, Computer Products
Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the ...
Tags: Computer Products, software