Malicious code can be surreptitiously planted on the Apple App Store and then downloaded by iOS devices, researchers have shown at BlackHat in Las Vegas, where they also showed how a bespoke charger could be used to hack an iPhone.
Browsing: Malware and Vulnerabilities
WASHINGTON, D.C. & NEW YORK, July 31, 2013 – The Industrial Control System Information Sharing and Analysis Center (ICS-ISAC) today announced that Bayshore Networks,
The Syrian Electronic Army is starting to pose a serious risk to enemies of the Assad regime in both Syria and further afield, according to security watchers.
PhishMe, the leading provider of security behaviour management services that improve employees’ resilience towards spear phishing, malware, and drive-by attacks, today announced the availability of its patent-pending Phish Reporter™
According to NQ Mobile’s 2013 Midyear Mobile Security Report, more than 51,000 new mobile malware threats were identified in the first half of 2013, infecting approximately 21 million mobile devices.
FireHost announced its latest web application attack statistics, which track the prevalence of four distinct types of cyberattacks that pose the most serious threat to businesses.
Growth in external hacking attempts, DDoS and malware attacks, and internal threats to data are the key security concerns for UK businesses.
Turkish security researcher Ibrahim Balic now claims he was behind the attack Apple admitted to in a statement to its developer network last Thursday, July 18, saying that sensitive personal information of some 275,000 members may have been compromised.
Trusteer, the leading provider of endpoint cybercrime prevention solutions, today announced the general availability of the Trusteer Cybercrime Prevention Architecture for e-commerce.
Facebook-for-bosses website LinkedIn has fixed a security vulnerability that potentially allowed anyone to swipe users’ OAuth login tokens.