The Samsung Galaxy S3 can be hacked via NFC, allowing attackers to download all data from the Android smartphone, security researchers demonstrated during the Mobile Pwn2Own contest in Amsterdam on Wednesday. Researchers from security ...
Tags: Samsung, Galaxy S3, NFC, Mobile Pwn2Own competition
The Windows version of Crisis, a piece of malware discovered in July, is capable of infecting VMware virtual machine images, Windows Mobile devices and removable USB drives, according to researchers from antivirus vendor Symantec. Crisis ...
Tags: Windows version, crisis malware, VMware virtual machine, mobile devices
Cyber criminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. Three months ...
Tags: Black Market, malware, Proxy, Symantec, Computers
About 200 Android applications currently hosted on Google Play create spoofed SMS messages on the devices they are installed on, according to security researchers from antivirus vendor Symantec. This technique can theoretically be used ...
A cyber security think tank has published a manual studying how international law applies to conflicts in cyberspace, where the laws of conventional warfare are more difficult to apply. The manual comes from experts working with the ...
Tags: cyber attacks, cyber security, cyber warfare, cyberspace, nternational law
A novel technique based on MapReduce could let hackers hijack computing resources used by cloud-based mobile browsers and use them anonymously, according to security researchers from North Carolina State University and the University of ...
Tags: cloud computing, Mobile browser hack, mobile device threat, smartphone
Attackers can abuse the way browsers and other applications handle steam:// protocol URLs in order to exploit serious vulnerabilities in the Steam client or games installed through the platform, according to researchers from startup ...
Tags: attackers, browsers, applications, URL, vulnerabilities
The 'CRIME' attack announced last week exploits the data compression scheme used by the TLS (Transport Layer Security) and SPDY protocols to decrypt user authentication cookies from HTTPS (HTTP Secure) traffic, one of the attack's creators ...
Tags: CRIME attack, data compression scheme, TLS, SPDY protocols, HTTPS
IDG News Service - Project Blitzkrieg, a coordinated attack against U.S. banking customers allegedly planned for the spring of 2013, is a real and credible threat, security researchers at McAfee have said. A cybercriminal using the ...
Tags: Computer Products, Credible Threat, Mcafee, Blitzkrieg E Banking Heist
Google yesterday patched 24 vulnerabilities in Chrome, and paid out $29,500 in bounties to nine researchers, more than half of that to one of the company’s most prolific bug finders. Chrome 22, which Google started pushing to ...
Tags: Chrome, Glazunov, Google, Google Chrome, Bounty Hunters
Security researchers have proposed several methods for users to protect their computers from ongoing attacks that target a new and yet-to-be-patched vulnerability in all versions of Java Runtime Environment 7. Most of the proposed ...
Tags: security researchers, methods, ongoing attacks, vulnerability, Java
Attacks targeting an unpatched vulnerability in the latest versions of Java 7 have become widespread after an exploit for the new flaw was integrated into the popular Blackhole attack toolkit, according to security researchers from ...
Tags: Java 7, unpatched vulnerability, attacks, exploit for flaw
The Iranian government appears to have blocked access to Google’s search engine and Gmail webmail service from inside Iran, according to Internet users there. A security researcher going by the Twitter handle of @0xal reported that ...
Tags: Blocked, cyber attack, Gmail, Google, Security
Security researchers from antivirus vendor Symantec identified two malware apps on Google Play that used a multistage payload delivery system in order to remain undetected. The apps, which have since been removed by Google, masqueraded as ...
Tags: antivirus vendor Symantec, security researchers, malware apps
Cybercriminals are trying to capitalize on Adobe's decision to stop distributing Android Flash Player to new users via Google Play by creating malware and adware apps that masquerade as Flash Player installers. Since Aug. 15, Android ...
Tags: Cybercriminals, Adobe, Android Flash Player, Google Play