Keyloggers are a dangerous form of a malware that hackers often use to get people’s data. You will want to know what keyloggers are so that you can avoid them.
Surfing the Internet can be quite risky if you don’t understand all of the threats that you face. Keyloggers are one of the biggest cybersecurity threats. A hacker can easily install a keylogger on your system and steal your most sensitive information. You need to understand the dangers that keyloggers pose so that you can remove them from your computer or mobile device. Read the rest of this entry »
5 Ways To Secure Your Next Android App
Android security has become a hot button issue among Android users and developers alike. While the Android platform does offer significantly more freedom when compared to iOS, BlackBerry and Microsoft operating systems, this freedom has a trade off; Android devices and applications have often been seen as far less secure than other options. For this reason, Android developers need to take special precautions when securing their applications. Read the rest of this entry »
McAfee stopS advanced threats within milLiseconds
New McAfee Threat Intelligence Exchange adds Real-Time Orchestration to the Security Connected Platform
Today McAfee announces McAfee Threat Intelligence Exchange, the first in the industry to orchestrate local and global threat intelligence information and enterprise-wide security products into one cohesive integrated security system.
What has traditionally taken days, weeks or months now only takes milliseconds. McAfee Threat Intelligence Exchange eliminates the gap between encounter to containment of advanced targeted attacks. Its unique approach allows immediate protection against the threats posed by advanced targeted attacks across both network and endpoint controls. Read the rest of this entry »
The viruses black business is raging again: keep your eyes open as two sophisticated threats paralyze computers worldwide.
Kaspersky Lab specialists reported a range of unique Careto virus capabilities has been discovered – the neoteric spawn of evil infects computers regardless of an operating system installed. A Trojan by its very nature, Careto carries myriads of modules in its malicious code, which enables it to be modified effortlessly. Careto nourishes a special interest to credentials, passwords, encryption keys, the network connection data and lots of other stuff. The virus was given such name because of the presence of Careto word in its code that means a ‘mug’ in Spanish. At the moment it is known about the infection cases of both Windows and Mac OS devices. Read the rest of this entry »
According to Kaspersky Lab’s analysis report, in 2013, the number of malware for Android has reached its absolute peak.
In late January 2014 in the Google Play experts found 200 thousand unique samples of malicious software for mobile platforms.
For the Android platform, there are over 10 million malicious applications, noted Kaspersky Lab experts, in its latest report. According to them, the end of January 2014 in Google Play and other resources they have found 200 thousand unique samples of malware for mobile platforms, which was masked as normal applications. It is worth noting that in November last year, the figure was less than 34% – 148 thousand samples. Read the rest of this entry »
A good antivirus program is an integral part of any computer user’s security strategy.
If you’ve ever wondered how these programs detect malware on your computer, you’re not alone. Let’s look at the various ways that antivirus software keeps your computer safe from viruses, worms, spyware and more.
Most antivirus programs run in the background on your computer, performing what is known as “on-access scanning”. Behind the scenes, the software is checking every file you open before allowing you to run it. This scanning isn’t limited to executable files: Archive files are checked for compressed viruses, and documents are checked for macros that can cause harm to your computer. Read the rest of this entry »
Kaspersky Lab receives the highest award 2013 Product of the Year for the best performance in all tests conducted by AV-Comparatives!
At the end of every year, AV-Comparatives releases a summary report to comment on the various anti-virus products tested over the year, and to highlight the high-scoring products of the various tests. This report – looks at all the comparatives tests of 2013 with more than 9 different certifications, not only the latest ones. Read the rest of this entry »
Wikipedia almost compromised due to a recent flaw found in open sources software.
When we think of Wikipedia, we don’t conjure images of dangerous page loads and deliberately misleading information. At worst, Wikipedia can provide you with some good information and some bad information. It’s really up to you to distinguish between the good and the bad. Even so, we wouldn’t necessarily characterize Wikipedia as “dangerous” in any way. But, the content of Wikipedia isn’t the only potentially dubious thing about the website. Recently, Wikipedia located and neutralized a harmful gap in their open-source code that could have been catastrophic for both the website and its millions of users. Read the rest of this entry »
In the implementation of the Linux kernel x32 ABI found serious vulnerability
The critical vulnerability (CVE-2014 – 0038) has been detected in the Linux kernel.
The vulnerability allows local users to elevate their privileges in the system and execute code with kernel privileges. The problem occurs only when compiling the kernel with support for x32 ABI, allowing the use of 64 -bit systems, 32-bit memory addressing model. The vulnerability manifests itself only on 64- discharge of the Linux kernel since release 3.4, compiled with the option CONFIG_X86_X32 (not to be confused with CONFIG_X86_32, the problem is not subject to the configuration in which the 32- bit applications run on a system with 64- bit kernel and 32-bit kernel build without support x32 ABI). Read the rest of this entry »