Monday, August 4th, 2014
Researchers have detailed a rare form of Windows malware that maintains infection on machines and steals data without installing files.
The malware resides in the computer registry only and is therefore not easy to detect.
It code reaches machines through a malicious Microsoft Word document before creating a hidden encoded autostart registry ...
Posted in Internet, Privacy, Security, Windows | No Comments
Thursday, July 31st, 2014
Sources at a growing number of financial institutions in the United States say they are tracking a pattern of fraud that indicates nationwide sandwich chain Jimmy John’s may be the latest retailer dealing with a breach involving customer credit card data. The company says it is working with authorities on ...
Posted in Internet, Privacy, Security | No Comments
Thursday, July 31st, 2014
Security researchers have found a fundamental flaw that could affect billions of USB devices. This flaw is so serious that, now that it has been revealed, you probably shouldn’t plug a USB device into your computer ever again. There are no known effective defenses against this variety of USB attack, though ...
Posted in Hardware, Security | No Comments
Tuesday, July 29th, 2014
A security researcher has found a great number of exploitable vulnerabilities in popular security solutions and the AV engines they use, proving not only that AV engines are as vulnerable to zero day attacks as the applications they try to protect, but can also lower the operating system's exploit mitigations.
"Installing ...
Posted in Coding, Internet, Security, Software | No Comments
Wednesday, July 23rd, 2014
Apple has "inadvertently admitted" to creating a "backdoor" in iOS, according to a new post by a forensics scientist, iOS author and former hacker, who this week created a stir when he posted a presentation laying out his case.
Apple has created "several services and mechanisms" that let Apple -- and, ...
Posted in Mobile, Privacy, Security | No Comments