An increasing number of vulnerability researchers will focus their attention on industrial control systems(ICS)in the year to come,but so will cyberattackers,security experts believe. Control systems are made up of supervisory software ...
Tags: SCADA security, ICS, critical infrastructure, control systems
The latest Java zero-day vulnerability is already available to users of the Metasploit tool and Blackhole exploit kit, say security researchers. The Java vulnerability allows attackers to use a custom web page to force systems to download ...
Tags: Metasploit tool, custom web, coded Java, security, FireEye
The creators of Carberp, a banking Trojan program used exclusively in Russian-speaking countries, have started to sell an improved version of the malware together with custom scripts that would allow cybercriminals to target U.S. online ...
Tags: Carberp Malware, Banks, Computer Products
Cybergeddon, a complete take-down of the internet, is undoubtedly within the power of some nation states, but is unlikely, say security industry experts. Bringing down the internet would not be in anyone’s interest, said Fred Piper, ...
Tags: Cybergeddon, internet, security industry, security consulting
Some security researchers wonder if Microsoft will indeed retire Windows XP on April 8, 2014, as the vendor has announced. After that date, Microsoft will no longer distribute official security updates or bug fixes for the ancient ...
Tags: Windows XP, security researchers, Microsoft, retire
New configurations of the Shylock financial malware inject attacker-controlled phone numbers into the contact pages of online banking websites, according to security researchers from antivirus vendor Symantec. By doing this, the attackers ...
Tags: Shylock financial malware, phone numbers, contact pages
The launch of Google Maps in Apple’s App Store last week has boosted iOS 6 adoption by 29 per cent, new data reveals. When iOS 6 launched in September, many iPhone, iPad and iPod touch users decided not to update to Apple’s ...
Tags: Google Maps, IOS 6 Adoption, Computer Products, App
Security researchers from Poland-based security firm Security Explorations claim to have discovered a vulnerability in the Java 7 security update released Thursday that can be exploited to escape the Java sandbox and execute arbitrary code ...
Tags: security researchers, Security Explorations, vulnerability, Java 7
Security researcher Michael Coppola demonstrated how small and home office (SOHO) routers can be compromised and turned into botnet clients by updating them with backdoored versions of vendor-supplied firmware. Coppola, who is a security ...
Tags: SOHO routers, botnet clients, backdoored versions, firmware
Security researchers disclosed critical vulnerabilities in routers from Chinese networking and telecommunications equipment manufacturer Huawei at the Defcon hackers conference on Sunday. The vulnerabilities -- a session hijack, a heap ...
Tags: critical vulnerabilities, Huawei, Defcon, security
Researchers from security vendor Damballa have identified malicious Internet traffic that they believe is generated by a new and elusive variant of the sophisticated TDL4 malware. The new threat, which has been assigned the generic name ...
Tags: TDL4 malware, Internet traffic, elusive variant, Fortune 500 Companies
IDG News Service - A new piece of malware that deletes entire partitions and user files from infected computers has been found in Iran, according to an alert issued Sunday by Maher, Iran's Computer Emergency Response Team Coordination ...
Tags: malware, deletes entire partitions, deletes user files, CERTCC
Dutch security researchers hacked an iPhone 4S on Wednesday, showing how a malicious webpage can send all pictures, address book data and browsing history on the phone to a server of the attacker's choice. As participants in the Mobile ...
Tags: Dutch, security researchers, iPhone 4S, Mobile Pwn2Own competition
Attackers can abuse Facebook's phone search feature to find valid phone numbers and the names of their owners, according to security researchers. The attack is possible because Facebook doesn't limit the number of phone number searches ...
Tags: Facebook, phone search feature, valid phone numbers, security researchers
Security researchers have uncovered a highly sophisticated, multi-tiered, global financial fraud ring that has attempted fraudulent transfers of up to 1.6bn from at least 60 banks This fraud empire, discovered by researchers from security ...
Tags: financial fraud, security, banking system, financial security