Cyber crooks misuse Google service to control Android Trojans
Cybercriminals have been spotted using a novel method of controlling Android mobile malware: a legitimate service called Google Cloud Messaging. GCM has been created to allow …
Hacker hijacks baby monitor camera, terrorizes family
A Houston, Texas couple got a great shock this weekend when they heard a male voice coming from a room where their two year old was sleeping. They heard the man shouting to …
Free Android anti-virus for mobile devices
Avira Free Android Security reached 2.0 and offers antivirus scanning and removal, as well as retaining the remote lock, wipe and “scream’ features available in …
Sweeping mobile phishing attack requests bank customers’ ID scans
A very thorough phishing campaign is targeting customers of JPMorgan Chase Bank who use their mobile phones to do their online banking, warn Trend Micro researchers. The …
Skyhigh Secure: Data security for information in the cloud
Skyhigh Networks announced Skyhigh Secure, a solution that enables organizations to address their critical cloud data protection requirements – including contextual …
AIAA releases framework for aviation cybersecurity
The American Institute of Aeronautics and Astronautics (AIAA) has released its decision paper “A Framework for Aviation Cybersecurity.” It outlines the existing …
Kaspersky updates its security solutions for home users
Kaspersky Lab released Kaspersky Anti-Virus 2014 and Kaspersky Internet Security 2014. Both products now include ZETA Shield antivirus technology, which performs an in-depth …
MS SQL Agent facilitates the collection of MSSQL audit records
SNARE for MSSQL allows a security administrator to remotely set up, control and monitor the application through a standard web browser and a self-contained installation …
Intigua: Automate the provisioning of management technologies
CIOs today are asking their IT teams to build private clouds that reflect the on-demand simplicity and agility that Amazon Web Services delivers in its public cloud. Unlike …
Microsoft releases critical fixes for IE and Exchange Server
There’s a remotely exploitable, publicly disclosed, critical remote code execution vulnerability in Microsoft Exchange (MS13-061)! But wait, is it really remotely …
Malicious ads lead to outdated adware-laden Firefox “update”
A series of Internet campaigns pushing bogus Firefox updates onto unwary users have been spotted by researchers, and among them is one that lures them in through “Green …
Multi-service authentication via palm vein images
Fujitsu has been creating and releasing palm vein biometric authentication and identification systems for over a decade, but have now presented a new one that definitely …
Featured news
Sponsored
Don't miss
- Tech support scammers impersonate Google via malicious search ads
- Observations from Black Hat USA 2024, BSidesLV, and DEF CON 32
- Authentik: Open-source identity provider
- Hide yo environment files! Or risk getting your cloud-stored data stolen and held for ransom
- Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)