Wednesday, March 19th, 2014
Dubbed Operation Windigo, the attack has been ongoing for more than two and a half years and has compromised as many as 25,000 servers at one time, anti-virus vendor ESET said Tuesday. Systems infected with the backdoor Trojan are used in stealing credentials, redirecting Web traffic to malicious content and ...
Posted in Internet, Linux, Privacy, Security | No Comments
Wednesday, January 29th, 2014
Kaspersky Lab researchers have recently analysed a piece of malware that works well on all three of the most popular computer operating systems - the only thing that it needs to compromise targeted computers is for them to run a flawed version of Java.
The Trojan is written wholly in Java, and exploits ...
Posted in Internet, Linux, Security, Windows | No Comments
Friday, January 17th, 2014
Security researchers at Proofpoint have uncovered the very first wide-scale hack that involved television sets and at least one refrigerator.
Yes, a fridge.
This is being hailed as the first home appliance "botnet" and the first cyberattack from the Internet of Things.
A botnet is a series of computers that seem to be ...
Posted in Hardware, Networking, Privacy, Security | No Comments
Thursday, December 19th, 2013
On Wednesday, security vendor Seculert reported finding that one of five malware types used in the attack had a unique cloaking property for evading sandboxes. The company called the malware DGA.Changer.
DGA.Changer's only purpose was to download other malware onto infected computers, Aviv Raff, chief technology officer for Seculert, said on ...
Posted in Internet, Security | No Comments
Tuesday, September 13th, 2011
The premise of a new (and fake) Facebook app called "If I Die" is sweet if a little morbid: You record a video message that will be played for your loved ones after your death. As the app advertisement says: "Death can catch you anywhere, anytime. Leave your If I ...
Posted in Internet, Privacy, Security | No Comments
Page 3 of 10«12345...10...»Last »