Friday, January 31st, 2014
Everyone typically beats up on Android for posing a security risk, with its third-party app stores and Google’s open access policies. But Apple iOS is not entirely above the fray, as a new proof-of-concept (PoC) “screenlogging” malware shows.
Neal Hindocha, a senior security consultant for Trustwave, is planning to demonstrate a ...
Posted in Hardware, Mobile, Privacy, Security | No Comments
Wednesday, January 29th, 2014
Spoofed versions of the popular file transfer program FileZilla that steal data are circulating on third-party websites, the organization behind the software said Tuesday.
FileZilla is an open source application, and hackers have taken its source code and modified it in order to try to steal data for more than a ...
Posted in Internet, Security | No Comments
Wednesday, January 29th, 2014
Kaspersky Lab researchers have recently analysed a piece of malware that works well on all three of the most popular computer operating systems - the only thing that it needs to compromise targeted computers is for them to run a flawed version of Java.
The Trojan is written wholly in Java, and exploits ...
Posted in Internet, Linux, Security, Windows | No Comments
Friday, January 24th, 2014
A new computer Trojan program attempts to install mobile banking malware on Android devices when they're connected to infected PCs, according to researchers from Symantec.
This method of targeting Android devices is unusual, since mobile attackers prefer social engineering and fake apps hosted on third-party app stores to distribute Android malware.
"We've ...
Posted in Internet, Mobile, Networking, Security, Windows | No Comments
Saturday, January 18th, 2014
Cybercriminals have stolen payment card data from six more U.S. retailers using similar point-of-sale malware that compromised Target, a computer crime intelligence company said Friday.
The conclusion comes from a study of members-only forums where cybercriminals buy and sell data and malicious software tools, said Dan Clements[cq], president of IntelCrawler, which ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments