New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data. Researchers from security firm Arbor Networks found two servers that were used ...
Tags: Computer Products, software
Prism whistle-blower Edward Snowden persuaded other National Security Agency (NSA) colleagues to give him their login details and passwords, which he later used to gain access to classified information that he later leaked to the media. ...
Tags: Computer Products, software
Security expert and reformed hacker Kevin Mitnick has branded anti-virus software useless, claiming: "The only thing McAfee is good at is making videos." Further reading Not enough cyber warriors to fight computer hackers, says former ...
Tags: Computer Products, software, hacker
A new report from the SANS Institute and RSA on help desk security and privacy finds help desk workers are the easiest victims for a determined social engineering criminal. Due to metrics and basic job requirements, end user and network ...
Tags: Computer Products, software
A new variant of the Citadel financial malware uses in-browser injection techniques combined with extensive content localization to steal log-in credentials and credit card information from users in different countries, according to ...
Tags: Computer Products, software
A new variant of the Citadel financial malware uses in-browser injection techniques combined with extensive content localisation to steal log-in credentials and credit card information from users in different countries, according to ...
Tags: Computer Products, software
Fresh from yesterday's revelations about BlackBerry security holes discovered by GCHQ at 2009's G20 meetings, BlackBerry is fighting similar claims against its newest BlackBerry 10 platform. BlackBerry posted an advisory on its Knowledge ...
Tags: Blackberry, Z10
The Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused malware services, according to a report from Finnish security vendor F-Secure. The ...
Tags: Android, Computer Products
Hackers are finding it pays to call ahead before sending malware-laden email. Symantec has seen what it describes as a sophisticated social engineering campaign aimed at French-speaking accounting and finance department employees. The ...
Tags: Malware, Computer Products
Recently, Shanghai Baosteel Engineering & Consulting Co., Ltd. ("Baosteel Consulting") is officially inaugurated. Baosteel Consulting's predecessor is Shanghai Baosteel Construction Supervision Company. For nearly 20 years, Baosteel ...
Tags: Baosteel, Metallurgy, Mineral, Energy
According to a new security report released today by NQ Mobile Inc., a global provider of mobile Internet services, mobile malware threats increased 163 percent to more than 65,000 in 2012. The company warns, however, that the problem is ...
IT leaders at Computing's Big Data Summit 2013 yesterday agreed that social media analysis could benefit them internally as well as externally, and could be the next step for them in order to get the most out of their big data tools. Tony ...
Tags: Computer Products
End Discrimination Now issued a highly critical statement regarding the new prescription drugs laws approved this week by the NYS Senate. Characterizing the “new” law as “alarmist”, “excessive” and ...
Rights advocacy groups and security practitioners remain on opposite ends of the spectrum on the merits of sharing information as a means to improve cyber security. The Electronic Frontier Foundation, the Center for Democracy and ...
Tags: rights advocacy, sharing information, Electronic Frontier Foundation
A cyber espionage operation dubbed MiniDuke has targeted government organisations in as many as 23 countries, security vendors said on Wednesday. The malware uses well-crafted PDF documents to trick recipients into opening the malicious ...
Tags: MiniDuke, Malware, Governments