Clones and compromised legitimate apps are a concern for mobile users
Cybercriminals continue to attack mobile phones through new and devious tactics, using both malicious clones and legitimate apps as bait.
We’ve stepped into the technologically advanced future that we grew up hearing about for quite some time now and so far it has been great. Unfortunately, the cybercriminal lot is determined to spoil the fun for all of us. After haunting computer machines, primarily Windows computers, for over a decade, they seem to have turned much of their attention to smartphones, the Michael Jackson of technology (oh come on, who doesn’t love the moon-walking King of Pop?). Giving a completely new meaning to communications and entertainment, the cell phones of today leave very little to be desired, except for maybe a force-field to deflect all the malware targeting them. As if the situation wasn’t bad enough already, McAfee Labs has revealed in its quarterly threat assessment that cybercriminals are targeting mobile devices in newer and smarter ways than before. Read the rest of this entry »
A critical vulnerability in Google allows access to the Google’s production servers
A Team of researchers discovered a critical XML External Entity (XXE) vulnerability on Google server that allows users to customize their toolbars with new buttons by uploading XML files containing layout properties. Sounds ridiculous but has been proven by the security researchers from Detectify.
Curious that the researchers used Google dorking to search for vulnerabilities within unpopular applications managed by Google, The Google Toolbar button gallery was the application that most of all attracted their attention.
The vulnerability resides in the Toolbar Button Gallery (as shown). The team of researchers found a loophole after they noticed that Google Toolbar Button Gallery allows users to customize their toolbars with new buttons. Read the rest of this entry »
ESET Company has recently published a 69 page report containing the detailed analysis of an ongoing large-scale attack on servers running on Linux, FreeBSD and other Unix-like systems since 2011.
During the attack (the codename ‘Operation Windigo’) a group of cyber criminals has obtained control of more than 25,000 of servers in three years, 10,000 of which were brought down by tones of malware. Read the rest of this entry »
It’s not a secret that many things in business depend on connections, and IT industry is no exception. Therefore, as a result of acquaintances a good number of prosperous projects emerged.
A striking example of cooperation is PayPal club: a group of familiar with each other PayPal former employees, have combined their efforts to call into existence a good bunch of extremely successful businesses, including Tesla Motors, LinkedIn, Palantir Technologies, SpaceX, YouTube, Yelp and Yammer. Four of them have become billionaires, which has probably made their friendship even stronger. Read the rest of this entry »
Keyloggers are a dangerous form of a malware that hackers often use to get people’s data. You will want to know what keyloggers are so that you can avoid them.
Surfing the Internet can be quite risky if you don’t understand all of the threats that you face. Keyloggers are one of the biggest cybersecurity threats. A hacker can easily install a keylogger on your system and steal your most sensitive information. You need to understand the dangers that keyloggers pose so that you can remove them from your computer or mobile device. Read the rest of this entry »
5 Ways To Secure Your Next Android App
Android security has become a hot button issue among Android users and developers alike. While the Android platform does offer significantly more freedom when compared to iOS, BlackBerry and Microsoft operating systems, this freedom has a trade off; Android devices and applications have often been seen as far less secure than other options. For this reason, Android developers need to take special precautions when securing their applications. Read the rest of this entry »
McAfee stopS advanced threats within milLiseconds
New McAfee Threat Intelligence Exchange adds Real-Time Orchestration to the Security Connected Platform
Today McAfee announces McAfee Threat Intelligence Exchange, the first in the industry to orchestrate local and global threat intelligence information and enterprise-wide security products into one cohesive integrated security system.
What has traditionally taken days, weeks or months now only takes milliseconds. McAfee Threat Intelligence Exchange eliminates the gap between encounter to containment of advanced targeted attacks. Its unique approach allows immediate protection against the threats posed by advanced targeted attacks across both network and endpoint controls. Read the rest of this entry »
The viruses black business is raging again: keep your eyes open as two sophisticated threats paralyze computers worldwide.
Kaspersky Lab specialists reported a range of unique Careto virus capabilities has been discovered – the neoteric spawn of evil infects computers regardless of an operating system installed. A Trojan by its very nature, Careto carries myriads of modules in its malicious code, which enables it to be modified effortlessly. Careto nourishes a special interest to credentials, passwords, encryption keys, the network connection data and lots of other stuff. The virus was given such name because of the presence of Careto word in its code that means a ‘mug’ in Spanish. At the moment it is known about the infection cases of both Windows and Mac OS devices. Read the rest of this entry »
According to Kaspersky Lab’s analysis report, in 2013, the number of malware for Android has reached its absolute peak.
In late January 2014 in the Google Play experts found 200 thousand unique samples of malicious software for mobile platforms.
For the Android platform, there are over 10 million malicious applications, noted Kaspersky Lab experts, in its latest report. According to them, the end of January 2014 in Google Play and other resources they have found 200 thousand unique samples of malware for mobile platforms, which was masked as normal applications. It is worth noting that in November last year, the figure was less than 34% – 148 thousand samples. Read the rest of this entry »