Discover a new way to find and share stories you'll love… Learn about Reading Desk

Trend Results : "Malware"


Related Searches

Blog Post Results (1-20 of 5952)

FILTER RESULTS

Be careful — I almost got fooled by malware

I’ve been around long enough to recognize malware when I see it, and I still take lots of precautions to ensure that something doesn’t sneak by (I use OpenDNS, Web of Trust, NoScript, and Ghostery, for example) but a few moments ago, I was almost tricked by a malware site, and if it could happen […]

Malicious Software Said to Spread on Android Phones

2 hours agoTechnology : Bits

Lookout, a security company, says it has been tracking malware that over the last two years has become more sophisticated.

Women in Business: Lysa Myers, Security Researcher for ESET

Lysa Myers began her tenure in malware research labs in the weeks before the Melissa virus outbreak in 1999. She has watched both the malware landscape and the security technologies used to prevent threats from growing and changing dramatically. Show More Summary

NotCompatible malware is back as a rising threat to corporate mobile users

In May 2012, mobile security platform Lookout reported the occurrence of NotCompatible, a malicious program broadcast by pirate websites. Once installed, NotCompatible made a ??proxy server, turning Android devices into zombies able to send and receive network data. For the … Continue reading ?

FTC shuts down massive “PC cleaner” scam

yesterdayTechnology : GigaOM

Every year, tens of thousands of consumers spend millions of dollars on services that purport to "clean" their computers, and protect them from spyware and malware. In reality, many of these…

Cyberattacks threaten your bank, your grid and you

Years ago hackers planted malicious software on computer systems that control parts of the United States' critical infrastructure, including pieces of the electrical grid, gas and water systems. The malware, which the Department of Homeland Security warned about only last month, was dubbed...

Stealthy Menlo Security raises $10M and assembles a rockstar board to rethink the war against malware

In the ongoing arms race between cybercriminals and the industry that tries to thwart them, another stealthy upstart has raised a sizable sum. It’s becoming par for the course in the space that the hottest startups, typically founded...Show More Summary

Chinese Authorities Shut Down WireLurker Distribution Site, Arrest Suspects Involved

Last Friday, Chinese authorities arrested three individuals that are suspected of developing the "WireLurker" malware, which infected thousands of mobile devices in China after Mac users installed malicious software from a third-party...Show More Summary

Chinese authorities arrest three suspects behind ‘WireLurker’ Mac and iOS malware

Earlier this month, a new type of Mac- and iOS-based malware called “WireLurker” appeared online. Apple responded by blocking affected apps from launching on OS X, but another development was made in the case today. According to ZDNet, Chinese authorities have arrested three suspects in connection with the malware and taken down the website that […]

Individuals behind Wirelurker malware arrested; Maiyadi App Store shut down

Three individuals behind the recently discovered Wirelurker malware were arrested last week by Chinese authorities, according to a report from Security Week. Additionally, the website the defendants used to disseminate the malware has been taken...

Chinese sites hosting 'Wirelurker' Mac-to-iOS malware taken down, suspects arrested

A Beijing government agency on Monday announced the arrest of three suspects thought to be behind the so-called "WireLurker" trojan targeting Mac and iOS devices, saying websites hosting the malware have been shut down.

Apple comments on Masque Attack

Masque Attack, the misuse of the iOS Enterprise Developer or standard developer systems to try and trick people into installing malware apps on their iPhones or iPads, made for sensational headlines earlier this week, despite it being a threat to relatively few users. Show More Summary

Tennessee Sheriff’s Department Forced To Pay $500 Ransom To Malware To Get Their Files Back

In a perfect world, the police are supposed to prevent crime, not become crime victims themselves. But a Sheriff’s Department in middle Tennessee collectively became the victim of a crime known as “Ransomware” and wound up having to pay a $500 ransom to get their files back, WTVF (Nashville) is reporting. Show More Summary

U.S. Warns Apple Users About iOS ‘Masque Attack’

Security weakness allows a hacker to replace an iOS app with malware

Dickson County Sheriff's Malware Ransom: Police Pay Hacker to Release Their Files

The Dickson County sheriff’s office got malware and had to pay over $500 in ransom to hackers to get rid of it, according to reports. The malicious software known as “Cryptowall” locked the Tennessee officers’ files in whats known as a “ransomware” scheme.

This Is How ATMs Get Hacked In Russia: Using Explosives

Forget super-skinny card skimmers and clever malware attacks. In Russia, many of the attempts to illegally obtain cash from ATMs are rather more crude — because they involve explosives. More »      

This Is How ATMs Get Hacked in Russia: Using Explosives

Forget super-skinny card skimmers and clever malware attacks. In Russia, many of the attempts to illegally obtain cash from ATMs are rather more crude—because they involve explosives. Read more...

Which Australian Cities Are Most Attacked By Malware?

New research from online security firm F-Secure has revealed the Australian CBDs that are most susceptible to Android-based malware attacks. Statistically, you could be twice as likely to encounter a threat depending on the capital city you reside in. Read on to see which major cities came out on top. More »      

Which Australian Cities Are Attacked By Malware The Most?

New research from online security firm F-Secure has revealed the Australian CBDs that are most susceptible to Android-based malware attacks. Statistically, you could be twice as likely to encounter a threat depending on the capital city you reside in. Read on to see which major cities came out on top. More »      

Copyright © 2011 Regator, LLC