All Blogs / Technology / Security / Popular


Banload Trojan Targets Brazilians With Malware Downloads

McAfee Labs has recently encountered new variants of the Banload Trojan. Banload has been around since the last decade. This malware generally arrives on a victim’s system through a spam email containing an archived file or bundled software as an attachment. Show More Summary

Vulnerability Exposes 900M Android Devices—and Fixing Them Won’t Be Easy

QuadRooter isn't just a vulnerability. It's a reminder of how hard it is to keep Android safe. The post Vulnerability Exposes 900M Android Devices—and Fixing Them Won't Be Easy appeared first on WIRED.

Downey Jr. Gets Excited With Avengers Movie Poster

Robert Downey Jr sparked debate among fans of the superhero universe when he shared a fan-made ‘Avengers’ poster.

‘Cat-Loving’ Mobile Ransomware Operates With Control Panel

Recently the McAfee Labs Mobile Malware Research team found a sample of ransomware for Android with botnet capabilities and a web-based control panel service. The malware is running on compromised legitimate servers. The payload of this malware can encrypt a victim’s files, steal SMS messages, and block access to the device. Show More Summary

Setting Up HTTPS for Google App Engine Applications

Thursday, we posted advice on creating a custom domain name for an application developed with Google’s App Engine. In this post, we will learn how to add SSL support and force the App Engine application to use only SSL. Start by obtaining an SSL certificate for your domain from an authorized certificate authority. Show More Summary

Oracle investigating data breach at Micros point-of-sale division

Micros was bought in 2014 as one of the largest point-of-sale terminal makers.

The dirtiest little secret about big data: Jobs

Big data holds enormous promise that it can help global organizations of all sizes to move faster and make better decisions. But, making it work demands something more than just good algorithms.

'Quadrooter' flaws affect over 900 million Android phones

All versions of Android are vulnerable to this flaw, which won't be fully patched until the September security release next month.

Hacker Unlocks ‘High Security’ Electronic Safes Without a Trace

An unassuming, but powerful attack on the safe you might have at your house. The post Hacker Unlocks 'High Security' Electronic Safes Without a Trace appeared first on WIRED.

Flaw in Samsung Pay lets hackers wirelessly skim credit cards

The tokens that are used to make purchases can be easily stolen and used in other hardware to make fraudulent transactions.

Torrentz Has Died, But It Won’t Take Torrenting With It

Everyone's favorite torrent search engine has closed shop. The next won't be far behind. The post Torrentz Has Died, But It Won’t Take Torrenting With It appeared first on WIRED.

With its bug bounty, Apple shows it finally finds hackers useful

But with a precedent already set, will hackers seek larger rewards from the feds?

Torrentz.eu Throws in The Towel

After Kickass Torrents was shut down, another torrent site will no longer be available to users.

Apple’s Finally Offering Bug Bounties—With the Highest Rewards Ever

Better late than never. The post Apple's Finally Offering Bug Bounties---With the Highest Rewards Ever appeared first on WIRED.

Creating a Custom Domain Name with a Google App Engine Application

Google’s App Engine is a Platform as a Service (PaaS) for developers that provides features and frameworks to quickly and easily build scalable web applications. Developers can create applications and deploy them to the App Engine. When a web application is created using the App Engine, the application is assigned a unique project ID. Show More Summary

Sad Windows XP Machine Spotted at the Las Vegas Airport

Seriously, it's time to upgrade to an operating system that actually receives security updates. The post Sad Windows XP Machine Spotted at the Las Vegas Airport appeared first on WIRED.

Meet the 'average paperclip threat': Why Airbnb rentals are the next big attack surface

A hacker will "always go for the weakest point," which in any network is usually the router. And it's no secret that routers are woefully insecure.

Hackers Fool Tesla S’s Autopilot to Hide and Spoof Obstacles

Researchers try out methods of jamming and spoofing the car's radar, ultrasonic sensors, and cameras---with disturbing results. The post Hackers Fool Tesla S's Autopilot to Hide and Spoof Obstacles appeared first on WIRED.

Severe vulnerabilities discovered in HTTP/2 protocol

Four high-profile bugs have been found in the protocol, potentially placing 85 million websites at risk.

How to access Tor, even when your country says you can't

You can still access Tor even when governments and authorities put barriers in place.

Copyright © 2015 Regator, LLC