Spyware is a growing threat on Android phones, according to research by Kindsight Labs, a division of Alcatel-Lucent.
Spotting “bad” apps on Android is not always easy - with cybercriminals finding new tricks every month to fool phone and tablet users into downloading malware.
Millions of SIM cards in use today are vulnerable to hacking - allowing for attacks where SIM cards could be cloned remotely, or voicemail numbers could be changed, according to a German security researcher.
New “ransomware” attempts to terrify users into paying up by using the name of Britain’s SOCA crime unit - the Serious Organized Crime Agency, dealing with drugs, people smuggling, human trafficking, major gun crime, fraud and computer crime.
A $250 signal-boosting device for cellphone users can be hacked, two researchers claim - offering total access to phone calls, internet use and text messages on devices connected to the “femtocell”.
Browser security warnings can work to protect users from phishing and malware sites - but “warning fatigue” means important alerts over site security can be conmpletely ignored.
“Bug bounties” paid out for finding and reporting bugs and vulnerabilities are a cheap and effective way for companies to bolster their security, an independent study by UC Berkeley researchers has found.
A U.S. Government department threw away IT components including printers, computer mice and keyboards in an effort to root out a “sophisticated” and “persistent” malware threat - which did not exist.
Mobile malware is growing at an extraordinary rate in China - with 25 times more detections of malicious programs last year than in 2011, according to official data released this week.
Up to 900 million devices running Android could be affected by a new vulnerability which would allow cybercriminals “full control” over affected handsets, Bluebox Labs has warned.
Making a mistake on Facebook or other social sites can cost a great deal - either in terms of accidental “oversharing", or allowing a cybercriminal access to your computer.
The Home Campaign is a malware campaign that uses a modified variant of Darkleech to direct visitors to the Blackhole exploit kit. We want to give a better idea of the size and extent of this campaign.
Cybercriminals have targeted U.S. energy companies with a wave of brute force cyber attacks, according to the Industrial Control Systems Emergency Response Team (ICS-CERT).
Bitcoin is not the only crypto-currency targeted by malware now that a Trojan designed to steal Litecoins has been discovered. In this post we review recent discoveries in malware impacting digital money.
The source code for banking malware Carberp has been released online - raising the possibility a new wave of attacks using variants of the sophisticated Trojan.
Google’s Safe Browsing program is now flagging 10,000 suspect websites per day, the search giant announced in a blog post
More people will be enjoying more digital devices on holiday trips this year than ever before, so we’ve rounded up the top tips for protecting your technology on the road, so you can enjoy a safer, less stressful vacation.
Cybercriminals cashed in on an internet rumor to fool 100,000 Android users into downloading a fake BlackBerry Messenger app for Android.
An investigation by a British talk radio station has shone light on the hackers who spy on young girls via webcams on compromised PCs.
ESET researchers explain the difficulties in attribution of targeted attacks; evidence is often circumstantial and the source never positively identified.