Tag: Featured
You are here: Home \ Featured \ Page 5
9 November 2015 - 11:57, by , in News, No comments
It’s about six weeks since we first wrote about XcodeGhost. That’s the Apple Mac malware that was specially created by crooks in China to create iOS malware. You read that correctly. Just as the infamous Stuxnet virus tried to infect PCs with the ultimate goal (allegedly) of indirectly infecting uranium centrifuge controllers, so XcodeGhost aims...
9 November 2015 - 11:02, by , in News, No comments
Mobile apps are regularly leaking information to third parties, according to research from the Massachusetts Institute of Technology (MIT), Harvard, and Carnegie-Mellon. The researchers tested 110 popular, free apps – half of them Android and half iOS – to find out which ones share personal, behavioral, and location data with third-party websites. Make that very...
9 November 2015 - 10:27, by , in News, No comments
The unflappable and suave James Bond is known for impeccable taste in clothes, cars and cocktails. The Bond brand has been attractive to luxury goods companies including car makers Aston Martin and Jaguar, which produced special editions for the latest film in the franchise, “Spectre.” Sony even made a Bond Edition smartphone, the Xperia Z5, complete...
6 November 2015 - 13:57, by , in News, No comments
We’ve written about ransomware a lot, because it’s such an odious and in-your-face sort of threat. Ironically, ransomware isn’t actually the most dangerous or insidious sort of malware. Ransomware crooks don’t steal your data covertly, or keep track of you via your webcam, or try to read your emails over an extended period for competitive...
6 November 2015 - 10:39, by , in News, No comments
If you’re an IT professional, you know better than anyone else about the concerns that go along with securing a business. Anything and everything from ransomware to phishing emails to lost smartphones – the list goes on and on. But of all the terrors that can plague your organization, which are your top concerns? We...
5 November 2015 - 13:57, by , in News, No comments
What harm can a selfie do? How much do you really give away if you upload images that contain snippets of information unique to you? Just how much detail can a crook really make out in low-resolution mobile phone snapshot that’s uploaded to a social media site? And even if crooks could dig out all...
5 November 2015 - 12:30, by , in News, No comments
How many times does the word “wasted” show up in your social media profiles and posts? What?! You don’t know? Even if you’re not sure of the answer, if you are in the US, looking for credit, there’s now a chance that the companies who assess your creditworthiness will. If you’re planning to get a...
4 November 2015 - 17:00, by , in News, No comments
First, the trick: on Halloween night, PageFair got hit by a Trojan masquerading as an Adobe Flash update. Then, the treat: the company managed to eschew non-apology mumbo-jumbo to issue a detailed, satisfyingly remorseful apology. Beginning late Sunday night, the day after the company discovered the attack, PageFair CEO Sean Blanchfield published a series of updated...
4 November 2015 - 12:53, by , in News, No comments
Forum owners and users beware! The website of popular forum software maker vBulletin has been breached. Following claims, nay, boasts, of an attack on Sunday evening, the software developer moved quickly to negate the effects of the hack by releasing a series of security patches on Monday, saying: A security issue has been reported to...
3 November 2015 - 11:27, by , in News, No comments
A controversial hacking company recently ran a competition offering $3m for up to three click-to-own exploits against Apple’s iOS. The exploits would be sold on to “eligible customers” only. The competition is now closed, but one exploit apparently met the grade and will earn $1,000,000. We investigate: what “click-to-own” means, why exploits of this sort...