There is a threat circulating on the Internet that I hope you will never experience. It is called CryptoLocker, and it is a form of ransomware – malicious programs that,
Browsing: Malware and Vulnerabilities
To developers, advertising frameworks may just be another way to make money from their free application, but in at least one case–dubbed “Vulna” by security firm FireEye
Security developers have released a stripped-down privacy-friendly browser, Aviator, based on the open source browser core Chromium as used by Google Chrome.
It’s a bad day for the vulnerability scanning industry: DARPA has announced a new multi-million-dollar competition to build a system that will be able to automatically analyze code, find its weak spots, and patch them against attack.
About two weeks ago, it was reported that “Paunch”, the author of the Blackhole Exploit Kit (BHEK), had been arrested by Russian law enforcement. (In addition to his work on BHEK, Paunch is also suspected of working on the Cool Exploit Kit.)
A young security researcher has developed the first ever malware designed to target the recently released Firefox Mobile operating system and plans to unveil the proof-of-concept at the at the upcoming The Ground Zero (G0S) 2013 security summit in November.
Lancope Presents Webinar on Safeguarding patient information and Defending Healthcare Networks with NetFlow
The US prides itself on being the best at a lot of good things. And, judging by the latest data from security vendor Sophos, America is still the best at spaffing spam in the world.
Google’s bold claims that Android doesn’t have a malware problem and is more secure than Apple’s iOS have singularly failed to convince security researchers.
Anti-Virus (AV) software, along with its Firewall side-kick, has been the standard weapon against Internet borne threat for the past two decades. But in a changing threat landscape AV is fast beginning to look past its sell-by date.