Another week, another scary-sounding security story. Here's why we wouldn't worry too much about "Godless." Security firm TrendMicro this week detailed "a family of mobile malware called Godless" that it says contained exploits that potentially could root a phone without a user's knowledge. Show More Summary
New malware that targets Google’s Android mobile […]
Android is an open source operating system widely used across the world, however it is prone to malwares. Despite such problems, consumers continue to enjoy the benefits from Google simply because the OS is one of the best out there....Show More Summary
Malware family packages a large number of exploits that give all-powerful root access.
The previous bit about using tape to cover your laptop camera got me wondering about the indicator light that shows when Mac FaceTime cameras are in use. Back in 2013, security researchers at Johns Hopkins University showed how thisShow More Summary
The popularity of Android devices and applications makes it a target for malware and other threats. This post is the second in a short series on Android application security. In the first article we discussed the basic android environment setup and penetration testing. Show More Summary
Malware most commonly reaches your business through email. As attacks become more sophisticated, your business could be vulnerable. The post Why secure email is essential for your business appeared first on Office Blogs.
The folks over at Trend Micro have recently discovered a new mobile malware that targets Android devices. The malware is called "Godless," and it can infect nearly 90% of Android devices.
Macro malware continues to evolve and use new tricks to evade detection. This threat is responsible for downloading malicious Trojans such as Dridex and ransomware such as Locky. Recently McAfee Labs has encountered a new variant of macro malware that uses new techniques to avoid executing in an undesirable environment. Show More Summary
Accounting for over one billion smartphone sales last year, Android is by far the most common operating system. It’s no surprise then that the OS is a prime target for malware and compromised security. While Google is very active in making Android safer, there are also a range of third party apps available. Read on to find out how to improve your security. More »
CYBERSECURITY: What the human immune system can teach us about protecting our data. Human operators are easily fooled by malware’s use of machine- learning techniques to blend into a network. This is where machine learning—techniques that train computers to adapt and learn from data with little or no human involvement—becomes a crucial part of the […]
Researchers discovered a new variant of the Frantic Locker malware.
The FLocker screen-locking ransomware has added Android-based smart TVs to its list of potential targets.
As hackers have become more successful, they have become emboldened and are able to attack companies via ransomware and malware as well as individuals via password theft. As ever-increasing amounts of crucial information are available...Show More Summary
The company's investigation has found more malware The widespread data breach that has been plaguing square burger and Frosty purveyor Wendy's since January is getting worse. The Ohio-based fast food chain announced "additional malicious...Show More Summary
Zscaler security researchers recently discovered new techniques that malware authors use to avoid detection by security professionals and protect their malware code from reverse engineering.
Sharing files and folders with your work colleagues might seem convenient, but the folders could be harboring a malicious threat. Over 10 percent of all shared folders in corporate environments now contain malware of some kind.
Criminals can dupe KeePass users into downloading malware through a security vulnerability in the free software
Modern malware is scarier, stealthier and more destructive than ever before. Here's what you need to watch out for.