Thursday, January 8th, 2015
Apple products have long enjoyed a reputation for superior security in relation to Windows systems, but a new proof-of-concept malware delivery method could put a serious dent in that reputation. The exploit, dubbed Thunderstrike, currently can’t be detected or removed by any known process without using specialized hardware. Security researcher ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Wednesday, December 17th, 2014
Most ransomware has a binary file that needs to be executed before it can infect your PC. Ransomware usually relies on social engineering or exploits to infect unsuspecting users. However, some malware authors are bypassing this requirement with a new trick - browser lockers.
Unlike traditional ransomware threats that lock the entire desktop, ...
Posted in Internet, Security, Windows | No Comments
Tuesday, November 11th, 2014
Remember Heartbleed? You know, the exploit in SSL that was so bad it got its own brand? Microsoft may have an issue of similar scale on its hands with a critical patch issued via Windows Update today.
The patch in question is MS14-066, or otherwise known as the cryptically named “Vulnerability in Schannel ...
Posted in Internet, Privacy, Security, Windows | No Comments
Tuesday, November 11th, 2014
A seven-year-old cyber espionage campaign has targeted senior level executives from large global companies by using a specialized Advanced Persistent Threat (APT), zero-day exploits, and well-developed keyloggers to extract information from them when they stay in luxury hotels during their business trips.
The researchers at Moscow-based security firm Kaspersky Lab dubbed ...
Posted in Internet, Privacy, Security | No Comments
Thursday, November 6th, 2014
As many as four out of five internet-connected households in the US could be at risk of attack through their wireless router.
This is among the findings of a study by security specialist Avast which found that more than half of all home routers are poorly protected using default or easily ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments