Don't click any porn links on Facebook. Just don't. It's a good rule of thumb, but there's an extra good reason right now. There's a troubling type of porn-based malware that's apparently infected over 110,000 Facebook users in two days. And you could get the same Click Transmitted Disease. Read more...
Recent cyber-security attacks on the likes of Target, Home Depot, JP Morgan Chase, and, most recently, Sony Pictures have shown us all just how damaging malware can be to a company’s reputation and bottom line, as intrusive hacks can cost businesses millions of dollars in damage, not to mention the cost of stolen high value [...]
Ever since the sophisticated and unprecedented cyberattack platform called "Regin" was uncovered in November, cyber sleuths have been working hard to put together all the pieces of this complicated puzzle. Regin was like a dinosaur:Show More Summary
Now you can steal a friend's drone for fun and profit.
This post is brought to you by Bitdefender. Macs are not immune to cyberattack and viruses. Though the threats are real, leading antivirus maker Bitdefender doesn’t use scare tactics to warn people about malware targeting Macs. Instead, Bitdefender is running … Read more ›
It's easy to forget that drones are essentially flying computers. And as autonomous flight features become the new standard, drones are quickly becoming computers that think for themselves—which is exactly why Maldrone is such scary software. Read more...
A new software-agnostic malware detection tool detects cyberattacks by their power consumption
Programmers of malware software have found a new way of making their exploits pay: A newly-discovered scam downloads malware to unsuspecting users’ computers and then makes those machines watch YouTube videos…
FORT LAUDERDALE - The digital ad industry may be starting to get to grips with the problems of fraud and viewability, but next up is the creeping threat from nefarious code. "The big priority for us is switching everything over to Secure...Show More Summary
A prominent browser exploit kit takes advantage of a new Adobe Flash flaw, infecting numerous Web browsers and operating systems.
[youtube src='//www.youtube.com/embed/Qn2g9qGbH_k?rel=0' width='640' height='360'] Blackhat opens with a POV shot of malware traveling from one computer to another, its snake-like digital movements ending in a crippling explosion at a Chinese power plant. Show More Summary
A hacker or group of hackers in China created the first major malware targeting Apple Inc. (NASDAQ:AAPL)’s iOS mobile operating system last year, Kevin Mahaffey said in an interview with Cory Johnson on Bloomberg West. According to the Lookout co-founder and chief technology officer, because Android is so much more popular in terms of number […]
Some recent users attempting to download the League of Legends client got a lot more than they asked for.
Attack on Asian site spawns super sneaky malware attack on online gamers.
Snowden docs show NSA tapped into S. Korean exploits of N. Korean networks.
Steganography sleuths invent exploit that sends secret message through Siri, but it has several limits
We ring in 2015 with a smattering of security stories; some deal with current cyber threats, some with CES 2015, and some that will just put a smile on your face. Skeleton Key Malware is the First Scary Cyber Threat of 2015 A new year, a new strain of malware. Show More Summary
Android malware infections in the U.S. increased 75 percent from last year, and ransomware is the new black, says a report from Lookout.
Mobile malware targeted at the enterprise is becoming increasingly sophisticated, according to security firm Lookout Inc.’s latest mobile threats report. The paper, titled Enterprise Mobile Threats 2014: A Year In Review, warns that attackers stepped up their focus on application-delivered … Continue reading ?
Free, reputable programs are available to search a computer for bots that can tax a system’s resources.