While the National Security Agency has gotten most of the recent flak for spying on people via the Internet and cell phone records, the Federal Bureau of Investigation appears to be doing some cyber spying of its own.
Browsing: Malware and Vulnerabilities
Panda Security released Panda Cloud Office Protection (PCOP) 6.7, which will enable users to roll-out Panda Cloud Systems Management (PCSM) automatically on their network.
The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found vulnerabilities.
The recently disclosed Android master key vulnerability by CTO of BlueBox, Jeff Forristal, allows an attacker to inject malicious code into an Android application without the need to alter or invalidate the application’s digital signature.
Microsoft, Apple, and every maker of mobile and desktop apps on the planet all have a problem: The moment they issue a security “patch,” or an update to their software designed to plug a hole that could be exploited by hackers
Malicious code can be surreptitiously planted on the Apple App Store and then downloaded by iOS devices, researchers have shown at BlackHat in Las Vegas, where they also showed how a bespoke charger could be used to hack an iPhone.
WASHINGTON, D.C. & NEW YORK, July 31, 2013 – The Industrial Control System Information Sharing and Analysis Center (ICS-ISAC) today announced that Bayshore Networks,
The Syrian Electronic Army is starting to pose a serious risk to enemies of the Assad regime in both Syria and further afield, according to security watchers.
PhishMe, the leading provider of security behaviour management services that improve employees’ resilience towards spear phishing, malware, and drive-by attacks, today announced the availability of its patent-pending Phish Reporter™
According to NQ Mobile’s 2013 Midyear Mobile Security Report, more than 51,000 new mobile malware threats were identified in the first half of 2013, infecting approximately 21 million mobile devices.