Security researchers from antivirus vendor Trend Micro have uncovered a piece of backdoor-type malware that infects Java-based HTTP servers and allows attackers to execute malicious commands on the underlying systems. The threat, known as ...
Tags: security researchers, Trend Micro, Java, HTTP servers, malware
Cyber extortionists shilling "ransomware" have upped the ante by pushing users' panic buttons with claims that their malware will wipe hard drives, a security firm said Monday. The claim is bogus, said Symantec, and is simply a ploy by ...
Tags: cyber extortionists, users, ransomware, panic buttons, malware, hard drives
A marketplace where security researchers can sell details on software bugs said it was compromised on Tuesday due to an "embarrassing oversight" that left its web server vulnerable. ExploitHub, based in Austin, Texas, has an online ...
Tags: ExploitHub, software, software bugs, web server, SQL database
The hacker group that recently infected Israeli police computers with the Xtreme RAT malware has also targeted government institutions from the U.S., U.K. and other countries, according to researchers from antivirus vendor Trend Micro. ...
Tags: hacker group, Xtreme RAT malware, U.S., U.K.
A new variant of a Trojan program called Reveton that prevents victims from using their computers and displays rogue messages from law enforcement agencies is using localized voice messages to trick victims into paying made-up fines, ...
Tags: Reveton, victims, computers, displays, antivirus vendor, Trend Micro
Undoubtedly 2012 has been another big year for mobile. From high-profile launches to security scares, from hot tablets entering the enterprise to huge players trailing with their tails between their legs, mobile is certainly the direction ...
Tags: mobile, security scares, tablet, IT infrastructure
Free mobile apps pose a serious threat to privacy because of their ability to capture large amounts of user information, a study has revealed. Free mobile applications are 401% more likely to track user location and 314% more likely to ...
Tags: free mobile apps, Juniper Networks, information, applications
Giving customers an element of control when it comes to storing their data in the cloud is the key to gaining their trust and, in turn, their patronage. This is the belief of Trend Micro’s solutions architect, Udo Schneider, who ...
Tags: Trend Micro, Encryption, cloud security, Computer Products
Virtualisation can improve security, but only if it is done correctly, says Rik Ferguson, director of security research at Trend Micro. Improved security can be achieved in virtual environments because security can be abstracted away from ...
Tags: Virtualisation, virtual and physical servers, security products
Orange Android devices will come pre-installed with the Lookout Mobile Security application to prevent mobile devices being affected by malware and spyware. The application will run in the background of the device, scanning applications ...
Tags: Orange Android devices, Lookout Mobile Security, malware and spyware
Allowing employees to bring their own devices to work is causing new challenges, including what happens when a device needs to be wiped or employees want to sell their smartphone or tablet. Mobile security and BYOD (bring your own device) ...
Tags: BYOD, mobile security, RSA, security conference
While newly-discovered malware that attacks VMware virtual machines is no cause for undue concern, users can take some basic steps to protect apps and data, says security firm Trend Micro. Earlier this week, advanced analysis of the ...
Tags: VMware virtual machines, security firm, Trend Micro, Morcut Mac OS X
The Olympic Games in London have sparked interest from fraudsters, with a raft of sites supposedly offering live video streams of events, according to security vendor Trend Micro. Trend Micro called out on Sunday more than a dozen sites ...
Tags: Fraudsters, Data Security, Olympic Games, London
Amazon is urging people to switch off a safety feature in Android, which prevents rogue apps from being downloaded, to install its own Appstore software. The online retailer has introduced its app store rival to Google Play in the UK and ...
Tags: Amazon, rogue apps, Appstore software, Amazon Appstore
Government departments have been given the go-ahead to use iPhones to send and receive sensitive emails, as part of moves to broaden the number of approved public sector mobile devices beyond BlackBerrys. Under new guidelines, civil ...
Tags: iPhone, mobile device, Apple device, BlackBerry