Search Results

Cyber security news 2014: Denial of service in FreeBSD Revealed the vulnerability in all supported branches of FreeBSD The flaw allows an attacker to reset the TCP connection by sending a specially designed package. In all versions of network operating systems FreeBSD has been discovered vulnerability (CVE-2004-0230). The flaw allows an attacker to reset the […]

Intelligence Gap: How a Chinese National Gained Access to Arizona’s Terror Center The un-vetted computer engineer plugged into law enforcement networks and a database of 5 million Arizona drivers in a possible breach that was kept secret for years. For five months in 2007, the Chinese national and computer programmer opened his laptop and enjoyed […]

Clones and compromised legitimate apps are a concern for mobile users Cybercriminals continue to attack mobile phones through new and devious tactics, using both malicious clones and legitimate apps as bait. We’ve stepped into the technologically advanced future that we grew up hearing about for quite some time now and so far it has been […]

Above is an old photo of the 7 year old daughter of Amanda Rieth who at the time was battling Stage IV neuroblastoma, this beautiful little girl is now 13 and has shown no signs of the cancer since 2007. But this photo is still circulating around social networks without the Rieth family’s consent and […]

As you may have already heard, support for Windows XP is to cease on 8 April 2014 – and if your business has yet to begin its migration, then it’s imperative to act now. After serving 13 years as one of the world’s most long-standing operating systems, Microsoft will no longer be releasing any patches […]

The Internet is filled with malicious software. You may think that it’s confined only to low quality websites or places where the webmasters aren’t so keen about checking user-submitted content, but it’s actually possible for malware to be hosted on any website. That gives hackers 700 million different websites through which they could deliver malware […]

The inquisitive minds must be wondering just how safe are Macs from malware such as viruses and stealth keyloggers. If I had a dollar for every time I heard someone say that Macs are way more secure than Windows, I’d have made it into Forbe’s list of richest people in the world a long time […]

McAfee Labs today published its quarterly report on the latest threat tendencies – review the details to get a generous portion of statistics and nutty facts. Traditionally, a ‘cold’ summer period, characterized by a relatively poor cybercriminal activity, is nine times out of ten followed by a fall’s wave of devastation that brings new forms […]

DRAFT: Embargo until 11/20/13, 12:01 a.m. ET Contacts: Chris Palm McAfee 408-346-3089 chris_palm@mcafee.com Stephanie Chaney Zeno Group 312-222-1758 stephanie.chaney@zenogroup.com MCAFEE LABS SEES NEW THREATS SUBVERTING DIGITAL SIGNATURE VALIDATION Third Quarter Threats Report Identifies Android Malware That Bypasses App Validation as Signed PC Malware Continues to Surge; Bitcoin Popular in Illicit Trade and Cybercrime SANTA CLARA, […]

Sophisticated malicious software by cybercriminals designed to silently steal banking credentials from victimized systems has been swimming the World Wide Web since 2002. However, it recorded its highest infections in the past three months. According to a new report from Trend Micro, they recorded over 200,000 new infections from July through September which is the […]