Please turn on your JavaScript for this page to function normally.
Zitmo Trojan masquerades as security app

Zeus-in-the-mobile (“Zitmo”) for Android users is back, pretending to be a security solution for the mobile operating platform. It masquerades as “Android …

Apps on iOS 6 will require explicit permission to access personal data

Users of Apple devices equipped with the upcoming iOS version 6 will be explicitly warned when the app they are trying to install asks permission to access their contacts, …

Democratic govts not immune to censorship attempts, says Google

Judging by the numbers contained in Google’s latest bi-annual Transparency Report, governments and government officials around the world have lately been approaching the …

Unpatched Microsoft flaw actively exploited in the wild

When Microsoft released a security advisory detailing a critical flaw in Microsoft XML Core Services and its corresponding “Fix it” mitigation solution last week, …

Six arrested for peddling Android malware in Japan

Six men – among which are three IT executives – have been arrested in Japan for having allegedly used Android malware to “earn” themselves over 20 …

US-CERT warns of Intel CPU flaw

A flaw in Intel chips leaves users of a number or x64-based operating systems vulnerable to system hijacking, the US Computer Emergency Readiness Team warns. “Some …

Windows Forensic Analysis Toolkit, Third Edition

As a considerable number of PC users has switched to Windows 7, Harlan Carvey has updated its popular Windows Forensic Analysis Toolkit book to cover the systems running it. …

Diablo 3 real-money auctions accessible only with authenticator

It seems that the long awaited Diablo 3 real-money auction house will finally become a reality, as Blizzard has changed its Terms of Use to make all players who want to access …

Fake Amazon email leads to exploit kit

Fake Amazon order confirmations are hitting inboxes and trying to trick recipients into following any of the links to a page serving the Blackhole exploit kit. The email looks …

Flame and Stuxnet are linked, say researchers

Kaspersky Lab researchers who have been rooting into the code of the Flame toolkit since its discovery believe to have unearthed definitive proof that, at one point in time, …

MySQL flaw allows attackers to easily connect to server

A simple but serious MySQL and MariaDB authentication bypass flaw has been revealed by MariaDB security coordinator Sergei Golubchik, and exploits targeting it have already …

Adobe delivers sandboxed Flash Player for Firefox users

Adobe released the newest version (11.3) of its Flash Player, with which its Protected Mode is now made available to Firefox users on Windows. “Our Protected Mode …

Don't miss

Cybersecurity news