What's the price of a new Windows 8 zero-day vulnerability?
It's not exactly the type of advertisement most people would understand.
Jeremy Kirk | 02 Nov | Read more
It's not exactly the type of advertisement most people would understand.
Jeremy Kirk | 02 Nov | Read more
Security researcher Zoltan Balazs has developed a remote-controlled piece of malware that functions as a browser extension and is capable of modifying Web pages, downloading and executing files, hijacking accounts, bypassing two-factor authentication security features enforced by some websites, and much more.
Lucian Constantin | 24 Oct | Read more
A new variant of the DroidKungFu Android Trojan is posing as a legitimate application update in order to infect handsets, according to security researchers from Finnish antivirus vendor F-Secure.
Lucian Constantin | 26 Oct | Read more
Websites that accidentally distribute rogue code could find it harder to undo the damage if attackers exploit widespread browser support for HTML5 local storage and an increasing tendency for heavy users of Web apps never to close their browser.
Lucian Constantin | 05 Oct | Read more
The latest espionage-related hacking campaign detailed by security vendor Trend Micro is most notable for the country it does not implicate: China.
Jeremy Kirk | 23 Sep | Read more
The politically oriented hacking group, Anonymous, has released 1GB of what is says are private e-mails and documents from an executive of a U.S. defense company that sells unmanned aerial vehicles to police and the U.S. military.
Jeremy Kirk | 19 Aug | Read more
The strange e-mails arrived in executives' inboxes around the same time that the Australian oil company was negotiating a deal with a Chinese energy company.
Jeremy Kirk | 05 Aug | Read more
Computers lacking patches for long-known vulnerabilities potentially face more of a hacking risk than from zero-day exploits, or attacks targeting vulnerabilities that haven't been publicly disclosed, according to new research from Secunia.
Jeremy Kirk | 30 Jun | Read more
The Black Hat Europe conference in Barcelona next week will feature a keynote on cyberwar from Bruce Schneier, and presentations on security flaws in Apple's Mac OS X and SAP's business software.
Jeremy Kirk | 11 Mar | Read more
Paul Laverack of London is an actor, but he's considering a possible career change -- to computer security.
Jeremy Kirk | 18 Jan | Read more
Trend Micro has released a tool that administrators can use to scan dozens of computers at a time for Stuxnet, the malicious software program that has raised widespread concern for its targeting of industrial systems made by Siemens.
Jeremy Kirk | 17 Nov | Read more
Google has added notification for phishing URLs to its service that lets administrators know if their networks have been compromised.
Jeremy Kirk | 15 Oct | Read more