Study: Hackers, IT pros share personal information online
Hackers apparently can be just as careless as their victims.
View ArticleCyanogenMod developers remove code that logged device screen-lock patterns
The development team of CyanogenMod, a popular community-built Android firmware, discovered and removed a line of code that posed potential security risks because it logged and stored device...
View ArticleWindows 8 security unshaken by antivirus vendor's claims
Bitdefender raises worry over trusting included antivirus software, but one analyst said Windows 8's core security picks up the slack
View ArticlePhishing attack targets CloudFlare customers
Customers of the popular CloudFlare website acceleration and security service were targeted in an email attack that directed them to a fake version of the website.
View ArticleCybercriminals are increasingly abusing .eu domains in attacks
Cybercriminals are increasingly using .eu domain names in their attack campaigns, according to data from multiple security companies.
View ArticleTor network used to command Skynet botnet
Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will adopt this approach, according to the team from...
View ArticleBitdefender Internet Security 2013 takes top place in AV-TEST trials
Security software analysis firm, AV-TEST, has bestowed Bitdefender Internet Security 2013 with the top spot following a round of independent testing.
View ArticleSMS stealing apps uploaded to Google Play by Carberp banking malware gang
Several malicious Android apps designed to steal mobile transaction authentication numbers (mTANs) sent by banks to their customers over SMS (Short Message Service) were found on Google Play by...
View ArticleJava 7 Update 10 allows users to restrict the use of Java in browsers
A recent Java 7 update allows users to completely prevent Java applications from running inside browsers or to restrict how Web-based Java content is handled by the Java Runtime Environment (JRE)...
View ArticleFCC issues security guidance to smartphone users
The U.S. Federal Communications Commission is advising smartphone users on how to protect their mobile devices and data from mobile security threats.
View ArticleJava zero-day vulnerability actively exploited by attackers
An exploit for a previously unknown and currently unpatched vulnerability in Java is being used by cybercriminals to infect computers with malware, according to security researchers.
View ArticleYahoo accounts hijacked via email-based attack: Bitdefender
A new email-based attack has been hijacking Yahoo accounts, security software company Bitdefender Labs has reported.
View ArticleEmail attack exploits vulnerability in Yahoo site to hijack accounts
Hackers behind a recently detected email attack campaign are exploiting a vulnerability in a Yahoo website to hijack the email accounts of Yahoo users and use them for spam, according to security...
View ArticleZero-day PDF exploit affects Adobe Reader 11 and earlier versions,...
Researchers from security firm FireEye claim that attackers are actively using a remote code execution exploit that works against the latest versions of Adobe Reader 9, 10 and 11.
View ArticleBitDefender traces MiniDuke espionage malware back to June 2011
Romanian security company BitDefender has traced the cyber-espionage malware "MiniDuke" back to June 2011, more than a year and a half before the campaign was uncovered
View ArticleCybercriminals using digitally signed Java exploits to trick users
Security researchers warn that cybercriminals have started using Java exploits signed with digital certificates to trick users into allowing the malicious code to run inside browsers.
View ArticleThe Android malware problem is not hyped, researchers say
Recent reports from antivirus companies seem to suggest that the number of Android malware threats is growing. However, there are still many skeptics who think that the extent of the problem is...
View ArticleResearcher hijacks insecure embedded devices en masse for Internet scanning...
An anonymous researcher created a massive botnet by hijacking about 420,000 Internet-accessible embedded devices with default or no login passwords and used it to map the entire Internet.
View ArticleMalware abuses Chromium Embedded Framework, developers fight back
A new version of the TDL rootkit-type malware program downloads and abuses an open-source library called the Chromium Embedded Framework that allows developers to embed the Chromium Web rendering...
View ArticlePrivacy taking a backseat? Adware on Android on the rise
Adware targeted at devices running Google's Android operating system has increased 61 percent globally, security software maker Bitdefender says.
View Article
More Pages to Explore .....