You may hate parallel parking, but you’re going to hate it even more when somebody commandeers control of your car with you in it.
Browsing: Malware and Vulnerabilities
Free the User | Contain the Threat – Invincea Webinar on Friday, August 9th, 2013 at 2:00 PM EDT
A Chinese hacking group accused this February of being tied to the Chinese army was caught last December infiltrating a decoy water control system for a U.S. municipality, a researcher revealed on Wednesday.
A new study of the ZeroAccess rootkit, believed to have infected 2.2 million home networks worldwide at the end of last year, has demonstrated that it continues to evolve, with new techniques to evade detection and hinder removal.
While the National Security Agency has gotten most of the recent flak for spying on people via the Internet and cell phone records, the Federal Bureau of Investigation appears to be doing some cyber spying of its own.
Panda Security released Panda Cloud Office Protection (PCOP) 6.7, which will enable users to roll-out Panda Cloud Systems Management (PCSM) automatically on their network.
The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found vulnerabilities.
The recently disclosed Android master key vulnerability by CTO of BlueBox, Jeff Forristal, allows an attacker to inject malicious code into an Android application without the need to alter or invalidate the application’s digital signature.
Microsoft, Apple, and every maker of mobile and desktop apps on the planet all have a problem: The moment they issue a security “patch,” or an update to their software designed to plug a hole that could be exploited by hackers
Malicious code can be surreptitiously planted on the Apple App Store and then downloaded by iOS devices, researchers have shown at BlackHat in Las Vegas, where they also showed how a bespoke charger could be used to hack an iPhone.