Latest News

Malware and Hardware Security

NIST Releases Mobile App Vetting Tool NIST Releases Mobile App Vetting Tool

The consumerization of IT and the bring-your-own-device phenomenon in the enterprise has given rise to concerns over data security stemming from risky mobile applications and unsecured devices. The US National Institute of Standards and Technology (NIST) is attempting to address the concerns with the launch of an open-source web application for managing the mobile app vetting process, dubbed AppVet.
24 April 2014

Security Experts: Verizon DBIR Should Be a Critical Wake-up Call to Enterprises Security Experts: Verizon DBIR Should Be a Critical Wake-up Call to Enterprises

Verizon released its Verizon Data Breach Investigations report (DBIR) this week, showing both an uptick in security incidents and a rising inability of enterprises to keep up with the rapidly evolving innovation on the part of cyber-attackers. Security firms were quick to weigh in with a slew of comments to Infosecurity about the report findings.
24 April 2014

Fake Porn App is First SMS Trojan to Land on US Soil Fake Porn App is First SMS Trojan to Land on US Soil

SMS trojans are starting to appear in more and more countries, and for the first time, researchers have detected an active SMS trojan in the US.
23 April 2014

Apple Fixes Critical Triple-handshake Flaw Apple Fixes Critical Triple-handshake Flaw

Apple has fixed a critical “triple-handshake” crypto vulnerability with a round of OS X and iOS updates that would allow an attacker with a privileged network position to capture data or change the operations performed in sessions protected by SSL.
23 April 2014

Banking Trojans, Bitcoins and Espionage Dominate Recent Cyber-threats Banking Trojans, Bitcoins and Espionage Dominate Recent Cyber-threats

Mobile banking trojans! Bitcoin wallet attacks! Cyber-espionage threats! It turns out that these three cyber-baddies are developing their attack trajectories exactly as predicted for 2014.
23 April 2014

Millions of Android App Downloads Are Vulnerable to Heartbleed Bug Millions of Android App Downloads Are Vulnerable to Heartbleed Bug

The Heartbleed vulnerability continues to sap the life force from various sectors, and it looks like the mobile applications space is not immune. New analysis has revealed that approximately 150 million downloads of Android apps contain OpenSSL libraries vulnerable to Heartbleed, a larger number than originally expected.
23 April 2014

Google Issues Unprecedented Refund and Apology for Scam Virus App Google Issues Unprecedented Refund and Apology for Scam Virus App

Google is refunding victims of a bogus Android app that called itself “Virus Shield” – despite offering zero anti-virus capabilities.
22 April 2014

DBIR: POS Attacks Wane, Cyber-espionage is Up DBIR: POS Attacks Wane, Cyber-espionage is Up

In the latest Verizon Data Breach Investigations report (DBIR), Verizon researchers noted that 92% of the 100,000 security incidents analyzed over the past 10 years can be traced to nine basic attack patterns that vary from industry to industry.
22 April 2014

Japan Awaits Its First Bitcoin ATM Japan Awaits Its First Bitcoin ATM

Japan's first bitcoin ATM will soon be landing in that country, earmarked for unveiling in Suzuka City, home of Japan’s Grand Prix event. From there, it will go on to a permanent location, to be determined.
22 April 2014

Stealer Trojan Becomes Mobile Malware Leader Stealer Trojan Becomes Mobile Malware Leader

It’s no secret that mobile malware is growing exponentially, with Android bugs leading the way, but one stands out above the rest: The Trojan-SMS.AndroidOS.Stealer.a - better known as 'Stealer' - has become a leader in terms of the number of attempted infections on user devices monitored by Kaspersky Lab.
21 April 2014

Showing 1 - 10 of 3,361 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×