The Washington Post has recently reported on the exploits of Luigi Auriemma, 32, and Donato Ferrante, 28, two Italian hackers that work from the island of Malta, searching for flaws in computer codes that they can sell to countries that want to break into the computer systems of foreign adversaries.
Browsing: Malware and Vulnerabilities
F-Secure is reporting that some new malware attempts in OS X are using a spoofing technique to disguise malicious installations as standard files. The technique involves using a special Unicode character in file names that will make an application appear to be a standard document file.
Bluebox Security, the mobile security startup that’s “working to save the world from information thievery”, has made a name for itself by finding and revealing the existence of an vulnerability that put 99 percent of all Android users in danger of unknowingly downloading malware.
You can take any industry in the world and you’ll find a community for it online. These communities are filled with characters and thinkers, jokers and talkers and folk who you’ll occasionally wish had
A persistent, widespread malware campaign that utilizes compromised Apache servers is locking users’ computers and demanding a fee of US$300 to free their data.
The Flash update fixes three critical vulnerabilities while the ColdFusion and Shockwave updates fix one each. Internet Explorer 10 and Chrome users will have the Flash updates installed automatically by the browser.
Microsoft has tightened the security requirements for apps available on its online stores, while providing plenty of wiggle room to avoid alienating much-needed developers.
IOActive has discovered vulnerabilities in the Emergency Alerting System (EAS) which is widely used by TV and radio stations across the United States.
The first half of 2013 has seen little change to the threatscape – it’s largely more and worse of the same: more malware, more spam, more sophisticated mobile malware, more espionage and more arrests, with just a couple of new developments.
A vulnerability that could affect 99 percent of the world’s Android-powered phones and tablets has been unearthed within the Google-owned platform.