Malware attacks seem to be evolving. The traditional viruses, Trojan horses, botnets and phishing attacks are still a threat, but the next generation malware takes insidious to a whole new level. Thankfully, theres a silver lining as well. ...
Tags: Malware, attacks, traditional viruses, Trojan horses, botnets
Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale online. In the past year, cyber criminals have used ...
Tags: Protection, Cyber Crime, Products
Current business security models fail to prepare for cyber threats in the face of highly sophisticated, powerful cyber attack tools that are no longer the preserve of nation states, as they filter down to a wider community of attackers. ...
Tags: security models, hackers, cyber attacks, Cyber criminals
IDG News Service - Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6 -- in order to infect computers with malware, according to researchers from security vendor FireEye. ...
Medical devices often use commercial PCs and have wireless connections that make them vulnerable to malware, or require software updates for security, but the U.S. may not be doing an adequate job tracking these risks, researchers ...
Tags: Medical-Device Security, security IT, malware, computer technology
Microsoft today patched 20 vulnerabilities in Word, Office, Windows, SharePoint Server, SQL Server and other products in its portfolio, including a critical bug in the company's popular Word program and another already used to attack the ...
Tags: Microsoft, vulnerabilities, Word, Office, Windows, SharePoint Server
Oracle has released an out-of-cycle security update to patch newly identified vulnerabilities in Java 7 that have been widely exploited, after the security community urged the company not to wait. The move comes hot on the heels of news ...
Tags: Oracle, Metasploit tool, Blackhole exploit kit, Java vulnerabilities
Microsoft has fixed 26 security holes in its software products – including five deemed "critical" – it said in its monthly security bulletin. The critical vulnerabilities affected Microsoft's Windows operating system, Internet ...
Tags: Microsoft, security holes, software products, critical vulnerabilities
Incident response investigations are increasingly showing businesses cannot rely on antivirus systems alone for protection, say security researchers. The gap is widening between the common malware threats most antivirus systems will ...
Tags: antivirus systems, security researchers, Ziv Mador, banking malware
Threat data Future of hardware-assisted security Why Intel bought McAfee Defence in isolation and containment Social media, cloud, big data and mobile apps Video: McAfee co-president Michael DeCesare on consumerisation and security The ...
Tags: hardware-assisted security, Intel, McAfee Defence, Social media, cloud
If attackers want to get in to an organisation's information systems, they will, says Frank Coggrave, general manager for Europe at e-discovery firm Guidance Software. "Many IT departments still have their heads in the sand on this issue. ...
Tags: information systems, IT departments, security investments, Software
An increasing number of vulnerability researchers will focus their attention on industrial control systems(ICS)in the year to come,but so will cyberattackers,security experts believe. Control systems are made up of supervisory software ...
Tags: SCADA security, ICS, critical infrastructure, control systems
Advanced malware that evades signature-based detection has increased nearly 400% in the past year, research by security firm FireEye has revealed. Companies are being hit by an average of 643 successful infections a week, according to the ...
Tags: FireEye, cyber attack, firewalls, intrusion prevention systems
The latest Java zero-day vulnerability is already available to users of the Metasploit tool and Blackhole exploit kit, say security researchers. The Java vulnerability allows attackers to use a custom web page to force systems to download ...
Tags: Metasploit tool, custom web, coded Java, security, FireEye
Cybergeddon, a complete take-down of the internet, is undoubtedly within the power of some nation states, but is unlikely, say security industry experts. Bringing down the internet would not be in anyone’s interest, said Fred Piper, ...
Tags: Cybergeddon, internet, security industry, security consulting