Friday, May 30th, 2014
Like a crowbar, security software tools can be used for good and evil.
Bootleg versions of a powerful tool called "Card Recon" from Ground Labs, which searches for payment card data stored in the nooks and crannies of networks, have been appropriated by cybercriminals.
This month, the security companies Trend Micro and ...
Posted in Internet, Networking, Privacy, Security | No Comments
Wednesday, May 21st, 2014
McAfee announced the latest version of McAfee Mobile Security that now enables consumers to run free privacy and security scans. These scans allow users to identify apps that are oversharing personal information.
It also scans for and removes malware and looks for other security threats. McAfee makes it simple for users ...
Posted in Internet, Mobile, Privacy, Security | No Comments
Monday, May 19th, 2014
More than a half-million computers in over 100 countries were infected by sophisticated malware that lets cybercriminals remotely hijack a computer and its webcam, authorities said as charges were announced Monday against nearly 100 people worldwide.
Authorities said 97 people suspected of using or distributing the malicious software called BlackShades have ...
Posted in Internet, Security, Windows | No Comments
Friday, May 16th, 2014
It’s a big bad world out there, and we’re pretty sure it’s not going to change any time soon. We’re talking specifically about malware, drive-by exploits and the like, because these attacks seem to be on the rise, and it’s kind of disconcerting.
Good then to see some tools start to ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, May 7th, 2014
Researchers have uncovered Android-based malware that disables infected handsets until end users pay a hefty cash payment to settle trumped-up criminal charges involving the viewing of illegal pornography.
To stoke maximum fear, Android-Trojan.Koler.A uses geolocation functions to tailor the warnings to whatever country a victim happens to reside in. The screenshot ...
Posted in Hardware, Internet, Mobile, Security | No Comments