Malware attacks seem to be evolving. The traditional viruses, Trojan horses, botnets and phishing attacks are still a threat, but the next generation malware takes insidious to a whole new level. Thankfully, theres a silver lining as well. ...
Tags: Malware, attacks, traditional viruses, Trojan horses, botnets
SMS text messaging is certainly not exclusive to Apple or its iconic iPhone smartphone. But, apparently there is something unique about the way Apple delivers SMS messages that makes the iPhone particularly vulnerable to spoofing or ...
Tags: SMS text messaging, Apple, iPhone, smartphone, smishing attacks
Phishing attacks are moving from targeting a few key employees in businesses to much wider groups of employees, according to corporate security awareness training company PhishMe. "Once they are in, attackers are using what they learn ...
Tags: Phishing attacks, PhishMe, security awareness, detections systems
The Information Commissioner's Office is to investigate claims that Tesco's website does not offer sufficient privacy protections to customers. The UK privacy watchdog's probe comes after security experts raised a number of privacy ...
Tags: watchdog, Tesco Website, privacy protections, security problems
Just days after a former employee blasted Mozilla for its frequent updates, the company on Tuesday shipped Firefox 14, patching 18 vulnerabilities and adding automatic encryption of searches passed to Google's search engine. The upgrade ...
Tags: Mozilla, Firefox 14, vulnerabilities, automatic encryption, Google
Attackers can abuse Facebook's phone search feature to find valid phone numbers and the names of their owners, according to security researchers. The attack is possible because Facebook doesn't limit the number of phone number searches ...
Tags: Facebook, phone search feature, valid phone numbers, security researchers
About 200 Android applications currently hosted on Google Play create spoofed SMS messages on the devices they are installed on, according to security researchers from antivirus vendor Symantec. This technique can theoretically be used ...
The planned introduction of more than 1,900 new generic top-level domain (gTLD) names by Internet Corporation for Assigned Names and Numbers (Icann) could have security implications, researchers have warned. The plan to allow web ...
Tags: gTLD, Icann, security implications
Attackers can abuse Facebook’s phone search feature to find valid phone numbers and the name of their owners, according to security researchers. The attack is possible because Facebook doesn’t limit the number of phone number ...
Tags: Facebook, highlightedpost, Mark Zuckerberg, Phone number search, privacy
Researchers from the Georgia Institute of Technology have discovered that almost all browsers currently used in smartphones and tablets are unsafe, so much so that even cyber-security experts are unable to detect when they are visiting ...
Tags: mobile browser, SSL, W3C, TLS
In its November 2012 Blue Coat Mobility Study,the company surveyed 350 respondents and found that most organizations allow employees access to company email(83 percent)and instant messaging(56 percent)on personal devices,but only a fraction ...
Tags: IT, Blue Coat Mobility Study, BYOD, mobile malware
About 200 Android applications hosted on Google Play create spoofed SMS messages on the devices on which they are installed,according to security researchers from antivirus vendor Symantec. This technique can theoretically be used for SMS ...
Tags: Android applications, Google, SMS