“Bug bounties” paid out for finding and reporting bugs and vulnerabilities are a cheap and effective way for companies to bolster their security, an independent study by UC Berkeley researchers has found.
A U.S. Government department threw away IT components including printers, computer mice and keyboards in an effort to root out a “sophisticated” and “persistent” malware threat – which did not exist.
Up to 900 million devices running Android could be affected by a new vulnerability which would allow cybercriminals “full control” over affected handsets, Bluebox Labs has warned.
Making a mistake on Facebook or other social sites can cost a great deal – either in terms of accidental “oversharing”, or allowing a cybercriminal access to your computer.
Cybercriminals have targeted U.S. energy companies with a wave of brute force cyber attacks, according to the Industrial Control Systems Emergency Response Team (ICS-CERT).
Bitcoin is not the only crypto-currency targeted by malware now that a Trojan designed to steal Litecoins has been discovered. In this post we review recent discoveries in malware impacting digital money.
The source code for banking malware Carberp has been released online – raising the possibility a new wave of attacks using variants of the sophisticated Trojan.
Google’s Safe Browsing program is now flagging 10,000 suspect websites per day, the search giant announced in a blog post
More people will be enjoying more digital devices on holiday trips this year than ever before, so we’ve rounded up the top tips for protecting your technology on the road, so you can enjoy a safer, less stressful vacation.
Cybercriminals cashed in on an internet rumor to fool 100,000 Android users into downloading a fake BlackBerry Messenger app for Android.
An investigation by a British talk radio station has shone light on the hackers who spy on young girls via webcams on compromised PCs.
ESET researchers explain the difficulties in attribution of targeted attacks; evidence is often circumstantial and the source never positively identified.
A simulated cyber attack with the Hollywood-esque title Quantum Dawn 2 will bombard the defenses of American banks on June 28 – in an exercise designed to test how Wall Street would endure a sustained hi-tech assault.
Microsoft has said that it has “liberated” two million PCs worldwide from Citadel botnets after an action on June 5 which targeted 1,400 networks.
Banks should look to spam emails and their own server errors as a source of information, says Nicholas Scott of National Australia Bank (NAB), speaking at the RSA Conference Asia-Pacific in Singapore.
British Prime Minister David Cameron has been warned that telecoms equipment made by Chinse firm Huawei should be tested by security services to protect against cyber attacks.
Microsoft and the FBI have broken up a large portion of the Citadel botnet – a network which had stolen $500 million from bank accounts in 90 countries around the world by installing keylogger software on five million machines.
In our previous post on Operation Hangover, we revealed the existence of an attack group, apparently operating from within India, who were mainly targeting systems in Pakistan. In this post, we will analyze the Mac OS X samples that have been linked to this group and will provide new evidence that the Mac and Windows spywares are related.