Government telecommunication-spying malware opens backdoor
The Chaos Computer Club claims that a government-made “lawful interception” Trojan has abilities that exceed those allowed by the nation’s legislature and …
Malware attacks up due to social media
63 percent of more than 4,000 respondents in a new Ponemon Institute survey said that social media in the workplace represents a serious security risk — yet only 29 percent …
Photos: The look and feel of Virus Bulletin 2011
Help Net Security is attending the Virus Bulletin 2011 conference in Barcelona this week. Here’s an overview of the event in photos. DC Bob Burls of UK’s Police …
GFI VIPRE Antivirus Business 5.0 released
GFI Software launched GFI VIPRE Antivirus Business 5.0 and GFI VIPRE Business Premium 5.0, the latest evolutions of the company’s flagship antivirus solutions. GFI has …
SpyEye Trojan hijacks mobile SMS security for online fraud
A stealth new attack carried out by the SpyEye Trojan circumvents mobile SMS security measures implemented by many banks. Using captured code, Trusteer discovered a two-step …
This is how Windows get infected with malware
When a Microsoft Windows machine gets infected by viruses/malware it does so mainly because users forget to update the Java JRE, Adobe Reader/Acrobat and Adobe Flash. This is …
Webroot SecureAnywhere integrates PC, Android and iOS security
Following Kaspersky One and McAfee All Access, Webroot announced centralized security management for PC, Android and iOS users. Webroot SecureAnywhere enables users to manage …
iPhone 5 spam emails lead to malware
Apple is expected to unveil the next iteration of its popular iPhone during a press event scheduled for tomorrow (October 4). As the excitement regarding the release of the …
Facebook now protects users from malicious links
Facebook and Websense announced a technology integration partnership that helps to protect Facebook users from links that lead to malware and malicious sites. Starting today, …
QR codes used to infect Android users with malware
Most people already know what QR codes are: a new type of “barcode” that can be used for a variety of purposes – tracking, ticketing, labeling of products, …
Critical vulnerabilities triple in 2011
Adoption of mobile devices such as smartphones and tablets in the enterprise, including the “Bring Your Own Device” approach, which allows personal devices to …
Mail-borne polymorphic malware soars
Approximately 72% of all email-borne malware in September could be characterized as aggressive strains of generic polymorphic malware, says Symantec in its September 2011 …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints