Symantec made the unsettling announcement today that it has discovered sophisticated malware that has been operating successfully on and off since 2008. Named Regin, the malware launches in a series of stages and is designed to avoid... Read more...
For the second time in less than a year, AT&T is left with egg on its face after discovering that one of its employees is responsible for a data breach. In this latest instance, an insider sidestepped AT&T's "strict privacy and security guidelines" and was able to view confidential information... Read more...
Word to the wise -- be careful crossing through intersections, even when you have a green light. We don't want to overstate the threat, but apparently you really can hack into a traffic signal and change the light, just as you've seen in... Read more...
Google's Android OS has received its fair share of flack over the past couple of years for its security issues, but sometimes, it's not the company or its OS at fault: It's the third-party developers. Proof of that can be seen from the... Read more...
A group of Russian hackers known collectively as either "Energetic Bear" or "Dragonfly" is mounting sabotage operations against a number of power and oil companies primarily located in the U.S. and throughout parts of Europe. Among the... Read more...
You're a unique individual. Not just in the way you look, dress, and act, but also in the way you smell. Don't be offended, we're not saying you smell bad, we're just having a little talk about science. If you didn't have a unique scent... Read more...
You'd have to imagine that the birds in Angry Birds are some of the angriest around, but last night, a "friend" of the hacking group Syrian Electronic Army saw it fit to add to their angst. For an undetermined amount of time, an image was... Read more...
Don't you miss the days when teenagers used to get in trouble for crossing over old man Jenkin's lawn on the way to school? It's a different a era we live in, one where the landscape is connected through cyberspace and ripe for mischief of... Read more...
It'd be a little crazy to imagine ending 2013 without another breach-of-security story, so fortunate for us, BBC has come to the last-minute rescue. On December 25th, a Russian hacker is said to have listed a sale on a black market website that offered information about accessing a BBC server... Read more...
Mobile security has become an issue of increasing importance, as mobile use has skyrocketed in recent years while cybercriminals have simultaneously spent more time finding ways to attack. There are several solutions out there, but a major... Read more...
RSA decided to publicly address recent reports alleging it inked a $10 million contract with the National Security Agency (NSA) to use what's considered a flawed and broken encryption standard called elliptic curve cryptography. In an... Read more...
Another day, another thing-that-is-hacked. This time it was popular cloud storage service Dropbox, but fortunately, the hackers were security researchers. Two of them, actually, named Dhiru Kholia and Przemyslaw Wegrzyn, who found a way to... Read more...
Two security researchers from iSEC, Tom Ritter and Doug DePerry, have demonstrated the ability to hack into Verizon Wireless’ femtocells and spy on Verizon users with a simple wireless antenna. They say that they can intercept... Read more...
You probably never thought that simply charging your mobile device would make you susceptible to malware, but apparently these types of hardware hacks could be the next big thing among cyber criminals. To prove it, a trio of security... Read more...
A 60-page study released today by Mandiant, an American cyber security company, is garnering lots of attention on the web today. The detailed report provides evidence of Chinese government-sponsored "Advanced Persistent Threat" (APT)... Read more...
The antivirus market is enormous, responsible for billions in revenue each year. That being the case, it'd be easy to believe that current offerings are quite good, but not so claims a report (PDF) by security company iMPERVA. This... Read more...
In many ways, RIM’s once mighty BlackBerry brand is now an also-ran in a mobile market that’s dominated by Android and iOS devices, but today’s news bodes well for the Canadian company. RIM announced that its BlackBerry 10 platform has received the prized FIPS 140-2... Read more...
A new report by network security provider Kindsight suggests that 13 percent of all home networks in North America are infected with malware, which is slightly less than the infection rate of the previous quarter (14 percent). That works... Read more...
Of all the hundreds of thousands of computer viruses, trojans, rootkits, and worms that have been written since 'Elk Cloner' first appeared in the wild in 1981, the overwhelming majority of them have targeted computer software. Attacking computer hardware directly isn't impossible now (and... Read more...
Did pigs fly? Because Russia has filed criminal charges against a spammer, something unprecedented in that country, the origination point of so many unwanted e-mails. Moscow police on Tuesday raided the home of Igor Gusev who is alleged to... Read more...
Can your USB keyboard and mouse be trusted? Can anything that you plug into your USB port be trusted? In a word, no. It's something we all should have known by now, but the truth is finally coming out thanks to some new research on the... Read more...
Symantec has released a report (.PDF) on what it calls "rogue security software." According to the report, Symantec has detected over 250 distinct rogue security software programs, and during the timeframe of the report, July 2008 - June 2009, 43 million attempted downloads of such rogue... Read more...
Prev 1 2 3 4 5 Next