FireEye has announced the release of FireEye OS 7.1, the update to the FireEye OS. FireEye says OS 7.1 offers more scalable management capabilities to its CM series, IPv6 network security support to the NX series, and enhanced email ...
Tags: computer
Pessimists are fond of saying that no good deed goes unpunished. An Australian teenager who reported a security vulnerability in a government website and now faces legal troubles probably agrees. Joshua Rogers, a 16-year-old Victoria ...
Tags: Consumer Electronics, Electronics
We were already aware of the existence of illicit marketplaces teeming with tools for cybercriminals looking to subvert the security of online networks. But one of the latest revelations from the cache of documents stolen by NSA ...
Tags: cybercriminals, security of online networks, Edward Snowden, NSA
A Russian-speaking group is advertising "bulletproof" hosting for cybercriminals from data centres in Syria and Lebanon, an apparent effort to place new services in locales where Western law enforcement has little influence. The ...
Tags: bulletproof, Russian, cybercriminals, data centre, Internet
On any given day cybercriminals and nation states are in possession of as many as 100 zero-day software exploits known only to them, NSS Labs has calculated using the commercial vulnerability market as a baseline. NSS Labs research ...
Tags: Computer Products, software
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data. Researchers from security firm Arbor Networks found two servers that were used ...
Tags: Computer Products, software
A new Trojan programme that targets users of online financial services has the potential to spread very quickly over the next few months, security researchers warn. The malware was first advertised on a private cybercrime forum in July, ...
Tags: Online Banking, Threatonline, financial services, security
Cybercriminals are increasingly using the “Blackshades” malware program whose source code was leaked three years ago, according to an analysis by Symantec. Blackshades, which Symantec identifies as “W32.Shadesrat,” ...
Tags: Symantec, Blackshades, malware
A new malicious software programme, advertised for sale on underground forums, claims to mine and steal bitcoins, according to a Danish security company. The Atrax malware is notable for its low US$250 price and use of TOR, short for The ...
The FBI has offered large rewards for information that could help them catch a clutch of alleged cyber-criminals. They include an El Salvadoran national accused of selling a Trojan designed to spy on husbands or wives believed by their ...
Malicious software aimed at stealing online banking credentials surged in the third quarter of this year to a level not seen since 2002, according to a new report from Trend Micro. The security vendor said it counted more than 200,000 new ...
The creators of a Web-based attack tool called Angler Exploit Kit have added an exploit for a known vulnerability in Microsoft's Silverlight browser plug-in to the tool's arsenal. Exploit kits are essentially malicious Web applications ...
Tags: Computer Products, software
Critical vulnerabilities in SAProuter, the SAP module used to connect users of the enterprise resource planning (ERP) software with SAP's update services, could be compromising their security, according to Alexander Polyakov, chief ...
Tags: Computer Products, software
Iovation, stopping Internet fraud and identifying good online customers with the world's most comprehensive device reputation database, announced that its flagship fraud-fighting service, ReputationManager 360, has won The Retail Fraud ...
Tags: Iovation, Retail Fraud Prevention
Network Solutions is investigating an attack by a pro-Palestinian hacking group that redirected websites belonging to several companies. Owned by Web.com, Network Solutions registers domain names, provides hosting services and sells other ...
Tags: DNS Hijack, Network Solutions