More fixes are appearing for a pair of highly dangerous vulnerabilities exposed earlier this month in the Android mobile operating system. Security vendor Webroot and ReKey, a collaboration between Northeastern University in Boston and ...
Tags: Computer Products, software
Android smartphones and tablets are under attack, and the most popular tools developed to protect them are easily circumvented, according to new research from Northwestern University and the University of North Carolina. The researchers ...
Tags: Computer Products
The Department of Homeland Security (DHS) has a warning for organizations that post a lot of business and personal information on public web pages and social media sites: Don't do it. Phishers, the agency said in an alert this week, look ...
Tags: web pages, social media
Prices are falling and the number of services is increasing as developers in the online underground compete fiercely for criminals looking to purchase botnets and other tools to mount cyber attacks. The trends in the so-called ...
More than 1,500 credentials for PayPal accounts are on sale in an eShop-style website set up by cybercriminals. The site, discovered by Webroot's Danco Danchev, is selling 1,543 PayPal account details, 14 of which belong to UK customers ...
Tags: cybercriminals, eShop-style website, PayPal
IDG News Service - Adobe Systems warned users of its ColdFusion application server software that hackers are reportedly exploiting unpatched vulnerabilities in the product to take control of affected servers. The company published a ...
Tags: Adobe Systems, ColdFusion application server software, software
Google on Friday said Chrome 25, now in development, automatically blocks browser add-ons installed on the sly by other software. The measure mimics what rival Mozilla did for Firefox over a year ago. Auto-blocking has already appeared ...
Anti-malware vendor Webroot has bet the company on cloud. In October of last year, the company stopped selling packaged software and moved to a software-as-a-service (SaaS) model. CEO Dick Williams says the switch improves the customer ...
Tags: SaaS model, CEO, Dick Williams, service mode, cloud
F5 and Webroot have announced a partnership to tie-up their networking and security offerings to protect enterprise applications from external threats. The deal will see F5 incorporate Webroot's IP Reputation Services into its Traffic ...
Tags: F5, Webroot, networking, security offerings
Cybercriminals are trying to capitalize on Adobe's decision to stop distributing Android Flash Player to new users via Google Play by creating malware and adware apps that masquerade as Flash Player installers. Since Aug. 15, Android ...
Tags: Cybercriminals, Adobe, Android Flash Player, Google Play
Cloud-based intelligence databases Customised risk tolerance Signature approach combined with local behavioral analysis Protecting systems offline File-scanning misses the big picture Read more about cloud and security Security continues ...
Tags: Cloud-based, intelligence databases, Security, anti-virus
While the risk of being hacked,conned or having sensitive information stolen is possible all through the year,most security experts agree that the holiday season brings a spike in fraudulent activity,both online and off. CSO compiled a ...
Tags: Christmas, Fraudulent auction, payment sites