A hacked Colombian Transport website has been rigged to deliver a malware payload that is able to target Mac OS, Windows and even Linux systems, according to a report from F-Secure. MORE SECURITY: Smartphone, tablet security and ...
Tags: Smartphone, tablet security, management guidelines, Linux systems
Research and advisory firm, Gartner, has released its list of technology predictions and trends for the years 2013 and beyond. According to Gartner, its top predictions focus on economic risks, opportunities and innovations that will ...
Tags: CIO, Gartner, IT, predictions, research, technology
Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain Dew, looking for public-facing IP addresses. When they found one, they enumerated the advertising services (Web server, ...
Google has upgraded its Chrome browser for Android devices, boosting its security framework and patching several security bugs. The security holes that were fixed were all rated as “medium” for their severity, and Google paid ...
Tags: Android, application, Chrome, Google, malicious, security
Microsoft has fixed 26 vulnerabilities in its software products, including several considered critical, the company said on Tuesday in its monthly security patch report. The security holes, described in five critical and four important ...
Tags: Microsoft, vulnerabilities, software products, Windows, Office, IE
Over half of Android devices are vulnerable to known security flaws that can be exploited by malicious applications to gain complete access to the operating system and the data stored on it, according to a report from mobile security firm ...
Tags: Android device, security flaws, malicious applications
Microsoft has uncovered a vulnerability in the PC supply chain that allows hackers to pre-install malware-infected copies of Windows onto new machines. As a result, the company has received approval from a federal court to strangle a ...
Tags: Microsoft, PC, surgical sinkhole
A researcher at North Carolina State University has uncovered a vulnerability that could be exploited to send deceptive text messages from some Android devices, as part of a phishing scheme. Particularly worrisome is the fact that the ...
Tags: Android, Phising, SMS, Android devices
Kaspersky Lab today appealed for help from top-notch cryptographers to help it break the encryption of a still-mysterious warhead delivered by the Gauss cyber-surveillance malware. "We are asking anyone interested in cryptology and ...
Tags: Kaspersky, cryptographers, encryption, malware
Trend Micro has updated its mobile security software to detect potential attacks on several Samsung Electronics devices that have a flaw that could allow a malicious application to access all of the phone's memory. The company's Mobile ...
Tags: Trend Micro, mobile security software, Samsung Electronics devices
Microsoft on Monday issued a security advisory that confirmed in-the-wild attacks are exploiting an unpatched bug in Internet Explorer. The software maker is working on a fix. The advisory addressed the “zero-day” ...
Tags: ie bug, Internet Explorer, Microsoft, patch, security
KPN closed a self-service portal for corporate ADSL customers on Tuesday after it discovered that 120,000 of its 180,000 business clients were still using default passwords, all variants of "welkom01," a company spokesman said Friday. The ...
Tags: KPN, ADSL customers, default password
A variation of the attack that can wipe data from Samsung Android devices when visiting a malicious Web page can also be used to disable the SIM cards from many Android phones, researchers have said. Ravishankar Borgaonkar, a research ...
Tags: Android, Galaxy Ace, highlightedpost, Samsung, SIM
Dropbox is investigating reports that some European users are receiving spam to email addresses associated with their accounts, the company said Tuesday. Dropbox, whose cloud storage service is widely used, said in a statement that "we ...
Security company Onapsis released on Wednesday a product that allows intrusion detection systems to recognize attacks against SAP applications holding critical financial and business data. The product, called Onapsis IPS, is a collection ...
Tags: Security company Onapsis, intrusion detection systems, SAP