LinkedIn's domain name was temporarily redirected to a third-party server Thursday, which resulted in a service outage and potentially put user accounts at risk of compromise. Uptime monitoring service Pingdom recorded that LinkedIn was ...
The amount of cyber-criminal activity associated with the Zeus family of financial Trojan programs has increased during the past few months, according to security researchers from anti-virus vendor Trend Micro. “The notorious ...
Tags: anti-virus, banking, BitDefender, Bogdan Botezatu, Citadel, CNME
Security researchers have identified multiple samples of the recently discovered "KitM" spyware for Mac OS X, including one dating back to December 2012 and targeting German-speaking users. KitM (Kumar in the Mac), also known as HackBack, ...
Tags: OS X Spyware, Mac, Computer Products
AutoIt, a scripting language for automating Windows interface interactions, is increasingly being used by malware developers thanks to its flexibility and low learning curve, according to security researchers from Trend Micro and ...
Recent reports from antivirus companies seem to suggest that the number of Android malware threats is growing. However, there are still many skeptics who say the extent of the problem is exaggerated. The security industry has an ...
Tags: antivirus companies, Android malware threats, credibility issue
Researchers from security firm FireEye claim that attackers are actively using a remote code execution exploit that works against the latest versions of Adobe Reader 9, 10 and 11. "Today, we identified that a PDF zero-day [vulnerability] ...
Tags: FireEye, remote code, Adobe Reader
Oracle’s bad Java week got worse on Wednesday, after it was announced that a previously unknown flaw in the programming language still threatens the security of millions of PCs. This is despite the fact that Oracle issued an emergency ...
Tags: Oracle, bad Java, unknown flaw
Going on the most recent security flaw in Java, Oracle should rewrite the programming language completely and start again from scratch, according to Bogdan Botezatu, Senior E-Threat Analyst with Bitdefender, a Romanian-based antivirus ...
Tags: Java, security flaw, Oracle, programming language
An exploit for a previously unknown and currently unpatched vulnerability in Java is being used by cybercriminals to infect computers with malware, according to security researchers. An independent malware researcher who uses the online ...
Tags: exploit, unpatched vulnerability, Java, cybercriminals
Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will adopt this approach, according to the team from vulnerability assessment and penetration ...
Tags: Security researcher, botnet, Tor network, DDoS
A recent Java 7 update allows users to completely prevent Java applications from running inside browsers or to restrict how Web-based Java content is handled by the Java Runtime Environment (JRE) client. These features will benefit ...
IDG News Service - Google on Thursday dismissed the possibility that a new wave of pharmacy, penny stock and e-card spam emails are being sent by Android spam botnets. "Our analysis suggests that spammers are using infected computers and ...
Tags: Google, pharmacy, penny stock, spam email, computers
IDG News Service - The U.S. Federal Communications Commission is advising smartphone users on how to protect their mobile devices and data from mobile security threats. The Commission released an online tool called the "Smartphone ...
Tags: FCC, security advice, smartphone, mobile devices.data
Facebook Gifts, the new social gifting service launched by Facebook on Thursday, might encourage users to expose information like their home addresses, birth date, clothing or shoe size that could pose security and privacy risks, according ...
Tags: Facebook Gifts, social gifting service, Facebook, users, information
Attackers can abuse Facebook's phone search feature to find valid phone numbers and the names of their owners, according to security researchers. The attack is possible because Facebook doesn't limit the number of phone number searches ...
Tags: Facebook, phone search feature, valid phone numbers, security researchers