malware in pictures
Security researchers have identified multiple samples of the recently discovered "KitM" spyware for Mac OS X, including one dating back to December 2012 and targeting German-speaking users.
A new variant of the Citadel financial malware is targeting users of the Payza online payment platform by launching local in-browser attacks to steal their credentials, according to researchers from security firm Trusteer.
The Australian Communications and Media Authority (ACMA) has launched a webpage which reveals that 16,500 cases of malware have been reported to internet service providers on a daily basis in 2013.
A recent intrusion on the computer network of Norwegian telecommunications company Telenor was the result of a large cyberespionage operation of Indian origin that for the past few years has targeted business, government and political organizations from different countries, according to researchers from security firm Norman Shark.
Security researchers from Trend Micro have uncovered an active cyberespionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and nongovernmental organizations from over 100 countries.
Tami asked the Antivirus & Security Software forum why friends are receiving spam that appears to come from her.
You wouldn't let your kids walk the streets of Amsterdam's Red Light District, but giving them unrestricted access to the Web is practically the same thing. The problem is, how do you block out all that inappropriate Web content?
IT and security professionals are increasingly concerned about targeted malware and data breaches. What's worse is that their confidence in their ability to identify and stop them is waning.
It's a common belief in the information security world that the Chinese government is behind many of the advanced persistent threats that target companies around the world in an effort to steal their IP and trade secrets. Now one security firm has come forward with years of evidence to link a prolific APT group to a unit inside the Chinese government.
For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
Whitepapers about malware
Despite widespread awareness of the impact of cyber crime, cyber attacks continue to occur more frequently and result in serious financial consequences. cyber attacks have more than doubled and the financial impact has increased by nearly 40 percent in a three year period. Find out hope advanced security solutions that uniquely leverage leading threat research deliver security intelligence spanning IT operations, applications and infrastructure.
Sign up now »
- FTOS Web Applications DeveloperNSW
- FTR&D EngineerSA
- FTLead Software EngineerSA
- FTSenior Python DeveloperNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTTechnical Business AnalystNSW
- FTQuality ManagerSA
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
Key mobile trends and analysis on how performance testers must change their testing methodologies to ensure they are accounting for the changes caused by mobile usage. Download today.
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- DHS warns employees that years-old database hole puts their privacy at risk
- Twitter's two-step authentication a good start, experts say
- U.S. urged to let companies 'hack-back' at IP cyber thieves
- AusCERT 2013: Introduction to Network Security Monitoring with Security Onion - AusCERT Presentation
- Auscert 2013: Perimeter protection has failed, encryption needs its day in the sun
- CITRIX SYNERGY ’13: Partners and customers main focus in mobile strategy, says Willis
- CITRIX SYNERGY ’13: Mobile is key to a digital worklife, says CEO (+12 photos)
- ASI brings LapCabby to Australia
- Two in three Australian tweens are on a social network: McAfee
- Huawei Australia 2012 revenue up 61 per cent to $368m
- Lack of information, skills hinder finance-business partnering: Deloitte
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- HP profit falls 32 per cent as PC and server sales decline
- Google launching new fund for later-stage tech investments
- Apple defends offshore decisions that result in low taxes