malware in pictures
News about malware
Interviews about malware
Security researchers have recently found a vulnerability that could be used to hijack Android apps and devices, but an older issue that can have the same effect remains a significant threat nearly two years after its discovery, according to security firm Bromium.
A new program that encrypts files to extort money from users highlights that attackers don't need advanced programming skills to create dangerous and effective ransomware threats, especially when strong encryption technology is freely available.
Most USB devices have a fundamental security weakness that can be exploited to infect computers with malware in a way that cannot easily be prevented or detected, security researchers found.
A group of attackers with links to the Chinese hacking underground has been targeting companies from the entertainment and video game industries for years with the goal of stealing source code.
The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.
Don't let the word "virtual" in virtual servers fool you. You're the only one who knows it's virtual. From the perspective of the virtual server itself, the devices connected to it, applications running on it, end-users connecting to it, or security threats trying to compromise it, the server is very, very real. A new survey from Kaspersky Labs found that many IT professionals understand that securing virtual environments is important, but don't fully understand the threats or how to properly defend against them.
Attackers are exploiting a vulnerability in distributed search engine software Elasticsearch to install DDoS malware on Amazon and possibly other cloud servers.
Kaspersky Lab has uncovered a type of encrypting ransomware that attempts to hide its malicious nature.
Features about malware
Melissa Andrews, a resident of Canada, is a cyber security "cop" for Payza, an international e-commerce payment platform operating in 97 countries. Her job, described by the company's public relations firm as "the worst security job on the Internet," is to protect the public from illegal, and many times revolting, content, by shutting the sites down and alerting authorities about criminal activity. She spoke with CSO this week about her job and why she is proud of what she does.
From 2012 to 2013, Incapsula, a website security firm focusing on CDN solutions as load balancing, found that bot traffic went from consisting of 51 percent to 61.5 percent of all Internet traffic, a 10.5-percent increase. Thirty-one percent of those bots are malicious, according to data from the report.
Ceaselessly, with no end in sight despite outlays that amount to a tax on doing business, the decades-long struggle against malware drags on.
A router is the heart of your network, so it deserves to be chosen carefully. Any router will share your Internet connection amongst your computers and other networkable devices (smartphones, tablets, and so on), but better models provide features that will enhance your network and its performance. Whether you're seeking a business- or consumer-class router, here are the eight most essential features to look for.
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them
Mobile malware is getting lots of attention these days, but you can’t forget about your PC’s security— after all, you probably still use it to pay bills, shop online, and store sensitive documents.
Malware targeting Android-powered mobile devices and Apple computers top a list scams and security threats the people need to guard against this holiday shopping season.
- PCI regime has bred complacent tick-box security among retailers, Tripwire survey finds
- No.10 Downing Street opens its doors to start-ups for first time
- Android vulnerability still a threat to many devices nearly two years later
- Paddy Power contacts 650,000 customers over data theft
- Attackers can easily create dangerous file-encrypting malware, new threat suggests
- McKinsey details 5 ways CMOs can spearhead business leadership
- Digital delivery lies at the heart of customer centricity, says AMP director
- Friday infographic: Who rules social channels for marketing, customer service?
- In a hyper-social world, some seek a little privacy
- Chatswood Chase reveals customer insights from iBeacon trial
- One in five apps send passwords as clear text: Symantec
- Aug 01
- Mitro makes password manager open source as team heads to Twitter
- Aug 01
- Microsoft security tool EMET 5.0 puts a leash on plugins
- Aug 01
- ACCC revises mobile terminating access service prices
- More News
- 05 Aug
- Systems Technology Day - Build Your Own Private Cloud
- 06 Aug
- Oracle Employee Experience Journey Mapping Workshops
- 20 Aug
- Westcon Group Imagine 2014 - Melbourne
- 21 Aug
- CAST 611 Advanced Penetration Testing
- View all events