Vulnerability leaves iPhones open to fake app attack
Security researchers have discovered a vulnerability in iPhones and iPads that allows attackers to install fake apps that take the place of legitimate ones.
Martyn Williams | 11 Nov | Read more
Security researchers have discovered a vulnerability in iPhones and iPads that allows attackers to install fake apps that take the place of legitimate ones.
Martyn Williams | 11 Nov | Read more
Hackers targeted an unclassified White House network in recent weeks but did not damage any systems, according to news reports.
John Ribeiro | 29 Oct | Read more
A coalition of security vendors has disrupted the activities of a sophisticated group of attackers tied to China that, over the past six years, infiltrated the computers of many Fortune 500 companies, journalists, environmental groups, software companies, academic institutions, pro-democracy groups and government agencies around the world.
Lucian Constantin | 29 Oct | Read more
Russia is likely behind a long-running computer spying campaign, although the stealthy attacks leave fewer clues than other state-sponsored attacks, according to a new report from FireEye.
Jeremy Kirk | 28 Oct | Read more
Security pundits were poring over Apple's new Yosemite operating system, with some noting that the revised Spotlight service was sharing search terms by default; Apple responded by arguing that the Spotlight Suggestions feature was in fact not violating user privacy, even as other onlookers warned that Yosemite's version of TextEdit would upload unsaved TextEdit document to the company's iCloud service.
David Braue | 28 Oct | Read more
Targeting message transfer agents (MTAs), and mail delivery agents (MDAs), criminals are using Shellshock as a means to create botnets. The process is slow, but working, thanks to unpatched installations of Bash or certain implementations of it.
Steve Ragan | 28 Oct | Read more
Targeted and malware attacks on European organisations doubled in the first half of 2014 with government, energy, finance and telecoms in the UK and Germany the hot targets, according to FireEye's latest EMEA Threat Report.
John E. Dunn | 22 Oct | Read more
A group of security companies say a collaborative effort has helped counter several hacking tools used by a China-based group most known for provoking strong condemnation from Google four years ago.
Jeremy Kirk | 15 Oct | Read more
Microsoft announced its upcoming Australian version of its Azure cloud platform had achieved government security certification. On similar lines, Microsoft also joined other technology providers in promising to protect student privacy, and developed a new way to securely isolate data and applications from the cloud infrastructure they're running on.
David Braue | 14 Oct | Read more
Security vendor FireEye will ramp up its local recruitment and training as it works to staff new security operations centres (SOCs) that it jointly announced this week with Singapore-based telecommunications concern SingTel through its Optus Australian subsidiary.
David Braue | 10 Oct | Read more
Researchers have discovered hackers trying to exploit the Shellshock Bash vulnerability to compromise network attached storage devices in universities in the U.S., Japan and Korea.
Antone Gonsalves | 02 Oct | Read more
FireEye has detected Shellshock attacks against network-attached storage devices made by Taipei-based QNAP and used by universities and research institutes in Korea, Japan and the U.S.
Jeremy Kirk | 02 Oct | Read more
Dutch security firm Fox-It has received 546 requests to decrypt files from UK-based victims of the CryptoLocker ransom Trojan since it launched a free unlock service last month, the highest proportion from any country.
John E. Dunn | 06 Sep | Read more
A group of hackers known for past cyberespionage attacks against the U.S. Defense Industrial Base, as well as companies from the electronics and engineering sectors, has recently started using a backdoor program to target Mac OS X systems.
Lucian Constantin | 06 Sep | Read more
Research on Android malware called KorBanker has uncovered a treasure trove of text messages that include authentication codes for Google and Facebook and VPN passwords.
Antone Gonsalves | 05 Sep | Read more