Top Android AV software fooled by common evasion techniques
A team of researchers from Northwestern University and North Carolina State University have tested ten of the most popular Android anti-virus software and have discovered that …
Multi-stage exploit attacks for more effective malware delivery
Most drive-by exploit kits use a minimal exploit shellcode that downloads and runs the final payload. This is akin to a two-stage ICBM (InterContinental Ballistic Missile) …
Trojans account for 80% of malware infections
PandaLabs today published its report analyzing the IT security events and incidents from January through March 2013. In the first quarter of 2013 alone, more than six and a …
Ex employee hacked into high-voltage power manufacturer’s network
A criminal complaint was unsealed on Thursday in federal court in the Eastern District of New York charging Michael Meneses – who was arrested earlier that day in …
Google Glass hacked, could be used for spying
The advent of Google Glass – the Augmented reality, head-mounted display that looks like a pair of glasses (albeit a little more high-tech) and allows users to access …
Is network monitoring dead?
Network monitoring is dead, says the CEO of cPacket Networks; that is, unless network monitoring solutions become agile enough to deliver real-time visibility, while keeping …
EiQ Networks launches SOCVue service
EiQ Networks announced SOCVue, a new remote management service. With this development organizations can now leverage EiQ’s SOC team expertise and knowledge to protect …
A primer on Bitcoin risks and threats
Bitcoin is a digital currency whose creation and transfer is based on an open source cryptographic protocol. There are many benefits to using it (no transaction fees, …
Fake AV scammers impersonate Microsoft
Cyber scammers continue to impersonate Microsoft and try to trick users into believing that their computer is serious need of an AV solution. Webroot researchers have spotted …
Serious website vulnerabilities continue to decrease
A new WhiteHat Security report has correlated vulnerability data from tens of thousands of websites from more than 650 organizations, with software development lifecycle …
FinFisher spy kit’s C&C servers are popping up around the world
Some two months ago, Reporters Without Borders have identified UK-based Gamma International as one of the “enemies of the Internet” due to their FinFisher spyware …
Which companies help protect your data from the government?
The Electronic Frontier Foundation has released its annual report on online service providers’ practices when it comes to protecting users’ privacy and data from …