Latest News

Malware and Hardware Security

Android Malware Repurposed to Thwart Two-factor Authentication Android Malware Repurposed to Thwart Two-factor Authentication

A malicious mobile application for Android that offers a range of espionage functions has now gone on sale in underground forums with a new trick: it’s being used by several banking trojans in an attempt to bypass the two-factor authentication method used by a range financial institutions.
17 April 2014

Netflix Scam Uses Elaborate Tech Support Ruse Netflix Scam Uses Elaborate Tech Support Ruse

Netflix is being used in a new phishing scam that lures victims into calling a “tech support” line, connecting to a live human that proceeds to probe around the user’s PC and lift information, behind an elaborate cover.
16 April 2014

Research Report Confirms Snowden’s Positive Effect on Industry Research Report Confirms Snowden’s Positive Effect on Industry

More than half of information security professionals believe the Snowden revelations have had a positive effect on the industry, according to a report released today. The research report, titled ‘Information security: From business barrier to business enabler’, surveyed 1,149 information security professionals across the globe about the industry landscape and the challenges they face.
15 April 2014

Mandiant: China-backed Cyber Threats Show No Signs of Abatement Mandiant: China-backed Cyber Threats Show No Signs of Abatement

More than a year after security firm Mandiant caused a stir by publishing a report that alleged China was behind widespread and increasingly sophisticated cyber-espionage projects, it’s back again to tell us that things have gone from bad to worse.
15 April 2014

Masergy Acquires Global DataGuard Masergy Acquires Global DataGuard

Managed services provider Masergy has acquired advanced security services provider Global DataGuard in a move that significantly ramps up its security portfolio.
09 April 2014

Zeus Variant Contains Legitimate Certificate Zeus Variant Contains Legitimate Certificate

A new variant of the Zeus banking Trojan, which Comodo Antivirus Labs is calling “extremely dangerous,” is being used by hackers to launch attacks that obtain the login credentials of visitors to online banking sites and commit financial fraud.
08 April 2014

Windows XP Support is Over, but the Finance Industry Persists in Using It Windows XP Support is Over, but the Finance Industry Persists in Using It

Today marks the end of support for Windows XP by Microsoft, and the beginning of a bonanza for hackers who will be targeting the vulnerable machines. XP usage has dropped across the board as companies upgrade, but new analysis shows that here’s still plenty of work to be done.
08 April 2014

Microsoft to Start Blocking Adware Microsoft to Start Blocking Adware

Pop-up ads that come as part of software packages are incredibly annoying, but they can also be dangerous and act as a top conduit for distributing malware. Microsoft is accordingly making some changes to the way it classifies adware, and will begin blocking it from user machines starting in July.
07 April 2014

Exploit Kits and Redirection Anchor the Data Theft 'Kill Chain' Exploit Kits and Redirection Anchor the Data Theft 'Kill Chain'

There is a growing global criminal-infrastructure-as-a-service economy being perpetrated through exploit kits and compromised website redirection chains – with billions of attacks adding to cybercriminals' sophistication and ability to evade detection. According to the latest Websense Security Labs 2014 Threat Report, the infrastructure of an attack campaign is now typically constantly developed, enhanced and reused throughout the entire threat lifecycle.
05 April 2014

Botnets Take to Mobile Dating App Tinder to Flirt and Hurt Botnets Take to Mobile Dating App Tinder to Flirt and Hurt

A series of bots have invaded the Android version of dating app Tinder, and are spreading dangerous downloads after luring users with tempting profiles and pictures stolen from an Arizona-based photography studio.
05 April 2014

Showing 1 - 10 of 3,347 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×