Friday, January 24th, 2014
A new computer Trojan program attempts to install mobile banking malware on Android devices when they're connected to infected PCs, according to researchers from Symantec.
This method of targeting Android devices is unusual, since mobile attackers prefer social engineering and fake apps hosted on third-party app stores to distribute Android malware.
"We've ...
Posted in Internet, Mobile, Networking, Security, Windows | No Comments
Thursday, January 23rd, 2014
All too often, we hear about web users who are targeted by litigators and law enforcement agencies, and accused of downloading copyrighted material on the basis of no more evidence than an IP address. But a pivotal ruling by a federal judge may have a significant impact on future lawsuits ...
Posted in Internet, Privacy, Security | No Comments
Thursday, January 23rd, 2014
Google has been pushing hard to incorporate speech recognition features into Web apps. But a Chrome exploit that can secretly transcribe your conversations unless you're paying attention probably wasn't what the company had in mind.
Whenever a website wants to access your microphone, Chrome requires permission. A dialog appears at the top of ...
Posted in Internet, Privacy, Security | No Comments
Monday, January 20th, 2014
SplashData has announced its annual list of the 25 most common passwords found on the Internet. For the first time since SplashData began compiling its annual list, "password" has lost its title as the most common and therefore Worst Password, and two-time runner-up "123456" took the dubious honor. "Password" fell ...
Posted in Internet, Privacy, Security | No Comments
Saturday, January 18th, 2014
Cybercriminals have stolen payment card data from six more U.S. retailers using similar point-of-sale malware that compromised Target, a computer crime intelligence company said Friday.
The conclusion comes from a study of members-only forums where cybercriminals buy and sell data and malicious software tools, said Dan Clements[cq], president of IntelCrawler, which ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments