- What's the Best Android Tablet? Google Nexus vs. Samsung Galaxy Tab 3
- The Moore's Law blowout sale is ending, Broadcom's CTO says
- How to define the scope of a project
- 10 Tips for Dealing with a Bully Boss
malware in pictures
A third-party advertising framework integrated in hundreds of Android apps contains a vulnerability that could allow hackers to steal sensitive information from users' phones, according to security researchers from antivirus firm Bitdefender.
Hackers of likely Chinese origin infiltrated computers belonging to the foreign affairs ministries of five unnamed European countries ahead of the G20 Summit in September, according to security researchers at FireEye.
Trustwave's SpiderLabs researchers have found a piece of malware that collects data entered into Web-based forms, pretending to be a module for Microsoft's Internet Information Services (IIS) web-hosting software.
A Russian-speaking group is advertising "bulletproof" hosting for cybercriminals from data centers in Syria and Lebanon, an apparent effort to place new services in locales where Western law enforcement has little influence.
Thirteen people, including the creator of Blackhole, a popular exploit tool used to infect computers with malware, were arrested and charged in Russia with creating and participating in a criminal organization.
Tami asked the Antivirus & Security Software forum why friends are receiving spam that appears to come from her.
You wouldn't let your kids walk the streets of Amsterdam's Red Light District, but giving them unrestricted access to the Web is practically the same thing. The problem is, how do you block out all that inappropriate Web content?
Ceaselessly, with no end in sight despite outlays that amount to a tax on doing business, the decades-long struggle against malware drags on.
Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users
IT and security professionals are increasingly concerned about targeted malware and data breaches. What's worse is that their confidence in their ability to identify and stop them is waning.
It's a common belief in the information security world that the Chinese government is behind many of the advanced persistent threats that target companies around the world in an effort to steal their IP and trade secrets. Now one security firm has come forward with years of evidence to link a prolific APT group to a unit inside the Chinese government.
For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?
Whitepapers about malware
Cyberspace has become a full-blown war zone as governments across the globe clash for digital supremacy, victories are fought with bits instead of bullets, malware instead of militias, and botnets instead of bombs. In this whitepaper, we look at the unique characteristics of cyber attack campaigns waged by governments worldwide and how security professionals can better identify an attack.
Sign up now »
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and ...
Enterprises, both small and big, are evaluating cloud computing and, in increasing numbers, are moving their IT infrastructure ...
"Thinking about ditching Yahoo altogether and just using my gmail accounts.."
Yahoo Mail still down for some users, after an attempted fix
"If these 200 services are rolled out like some of the existing ..."
Queensland government to provide 200 services online by 2015
"So, because organisations have put Technology Managers into roles and called them ..."
CIOs need to get their house in order, CFO panel says
"big data is the future. Register for Jan 24-26 #BigData Bootcamp-Santa Clara ..."
Is Data Complexity Blinding Your IT Decision-Making?
"There's a lot in what you say that applies to financial markets. ..."
Why IT projects really fail
- Show us a better way than collecting metadata, NSA director says to critics
- Arizona lawmaker hopes to stop NSA spy efforts in her state
- Juniper: Quick look at security strategy behind its SDN controller security
- The top 8 security threats of 2013
- Nvidia exploit could turn render farms into password crackers, bitcoin miners, researchers claim
- Jacob's Creek taps into Facebook data for personalised customer greetings
- In Pictures: 12 Big Data predictions for 2014
- Facebook performance report signals rising brand engagement on social
- Australia's love of online search advertising continues, finds new report
- Why Shazam is helping advertisers hit the right tune with consumers