Mobile threats are becoming more complex, and more difficult to deal with as more and more devices become connected, a former vice-president of security trade body ISACA has warned.
Archives - September 2013
Microsoft has released an emergency fix for a vulnerability in all versions of Internet Explorer - warning that targeted attacks are already attempting to exploit it.
A hacked card reader - similar to the ones used in shops and restaurants - is on sale on Russian forums for $2,000, and can "text" details including PIN numbers to cybercriminals, who empty bank accounts in three hours using teams of money-launderers.
“Hardware Trojans” could be baked invisibly into circuits by attackers, allowing them to grab secret keys from computer components without fear of detection - even by advanced inspection systems using optical microscopes.
Cybersecurity insurance or "cyber insurance" was a hot topic at the latest NIST workshop on the critical infrastructure cybersecurity framework (CSF) in Dallas. Will the CSF become a standard used by insurers to determine rates?
With malicious remote access attacks of the rise it is time to check your computer's RDP configuration and apply restrictions, like turning it off, limiting users, and applying strong passwords
A brainwave scanner could be used as the ultimate biometric “car key” according to researchers at Tottori University - and even prevent carjackings, drunk driving, or accidents caused by drivers falling asleep.
Six Nigerian men have gone on trial today in London for an alleged phishing scam where job offers at London’s exclusive Harrods department store were used as “bait”.
Iron Mountain claims that up to two-thirds of employees work from home in Europe at least part of the time - but a mere 18% of firms offer guidance on how to protect information outside the office.
A new variant on a family of Mac OS X malware which targets Tibetan activists has been found in the wild and shared on the Virus Total website, where security researchers show off new “finds”.
A breach which has leaked personal data for two million Vodafone Germany customers has ben claimed to be the work of an insider, according to Vodafone.
“Passwords are done at Google,” said Heather Adkins, Google’s information security chief - and said that “the game is over” for start-ups relying on passwords as the chief method to keep users secure.
These days cybercriminals will use phone calls, SMS messages, emails, fake apps - and even couriers - in an effort to get your money. The key to staying safe is to recognize behavior that isn’t quite “right” - and catch phishers and fraudsters in the act.
What are the immediate practical implications of the Snowden-prompted revelation that the NSA has broken or circumvented a lot of commercially available encryption? For a start, you should not stop using encryption, but you may want to review how you use it moving forward, Stephen Cobb explains.
Twitter has been hit by a wave of spam promising “pure garcinia cambogia” - a vegetable extract used in weight loss supplements. High-profile accounts such as Jane Fonda's fell victim, with attackers compromising Hootsuite accounts to gain entry.
Apple introduced biometric security to iPhone for the first time with the launch of its new iPhone 5S, featuring what Apple describes as an “intelligent” and “accurate” laser fingerprint sensor.
After taking quite a long break from comment moderation on the WeLiveSecurity blog, I’ve recently started receiving comment notifications and have therefore been able to moderate some of the comments that have I’ve seen, and I thought it was worth passing on some thoughts about the moderation process as I see it. I should make
Keylogging tools to steal personal information from victims are available as a “service” from a site known as PrivateRecovery, which offers the tools for just $25 to $33 a month, according to a list of leaked records seen by researcher Brian Krebs.
Simply holding your phone a few inches from your PC to "hear" signals inaudible to humans will be enough to log in to sites and services previously protected by cumbersome two-factor systems, a new start-up claims.
In this 3rd Hesperbot blog post we’ll look at the most intriguing part of the malware - the way it handles network traffic interception.