Malware dubbed ‘Moon’ due to images found within the malware has spread rapidly through many models of Linksys routers – even ones protected by passwords – it’s still not clear how many are infected – or if the malware has a purpose beyond simply spreading.
If your system administrator looks a little frazzled this week, be nice to him or her and don’t grumble too much about the photocopier being jammed. It may be that they have more serious issues on their mind.
A little-known banking trojan, developed in Russia, has managed to infect thousands of victims’ computers without the knowledge of their owners. Graham Cluley takes a closer look.
A small American law firm has admitted that every document on a server at the North Carolina company has fallen prey to the Cryptolocker ransomware, according to a report by local station WSO CTV.
A fake version of Facebook’s 10th anniversary celebration video page, ‘A Look Back’ is spreading via the social network, with users directed instead to another website, where they are prompted to download files.
Managers at White Lodging, a hotel management firm that works with various brands including Hilton, Marriott, Westin, Sheraton and Hyatt, may have known of a major credit card data breach for two weeks before details were made public.
A statistical tool first used in 1966 and currently used in speech and gesture recognition may hold a key to sniffing out botnets – by predicting the likely “next move” of infected PCs and the healthy computers around them, researchers have claimed.
The FBI has announced the arrest and charge of Alexsandr Panin, 24, a Russian hacker who developed the SpyEye trojan and used it to steal financial information and money from around the world.
Facebook has given out a record fee for bug discovery, after a Brazilian security researcher exposed a vulnerability that could have been used to deliver malware to millions of Facebook users.
Luxury retailer Neiman Marcus has revealed that a breach which led to customer payment cards being used for fraud after shopping in its stores was far worse than first revealed – with 1.1 million cards affected over several months.
Banks around the world face a looming deadline to upgrade their ATMS – 95% of machines worldwide run Windows XP, which Microsoft will cease to support on April 8. Just 15% of America’s ATMs are expected to upgrade by that point.
A Californian blogger was among victims of a malware attack which targeted critics of the communist state in Vietnam, as well as staff at U.S. privacy group Electronic Frontier Foundation.
In this post, we examine the complex it fits into a larger click fraud ecosystem, where users can be redirected either automatically, or through search engines browsing, to advertisement websites.
Cisco claims in its report that cybercrime is now a global, professional industry – and there is a worldwide shortage of professionals able to defend against such attacks, with new technologies in malware meaning that there is a shortfall of a million IT professionals.
The computer giant announced the change of policy in an official blog post in which it said that although XP was no longer “a supported operating system”, security updates would continue until July 2015.
At CES 2014, the app was king – and more importantly, the appcessory – fridges, lights, appliances and gadgets built for app control. But with companies unveiling door locks controlled via app, should we applaud – or worry?
A secret technology which relied on radio transmissions has allowed the National Security Agency to spy on computers disconnected from the internet – a security measure known as an ‘air gap’, and commonly used to protect machines containing highly sensitive data.
Computer users often feel bombarded by warnings about malware – particularly in internet browsers, which often repeatedly warn about risky sites – but tricks used by cybercriminals can help stop this, a new paper claims.
Major international cyber attacks follow a pattern – and attacks such as Stuxnet, which targeted Iran’s nuclear plant can be predicted by a mathematical model, University of Michigan researchers have claimed.
Malicious software was installed in tills in Target stores across the U.S. and went undetected for weeks, the chain has admitted, harvesting information from the magnetic stripes on customer cards during transactions.