Trojan infection triggers massive printing jobs
If your printers start printing garbage characters until they run out of paper, it’s a sure sign your network has been hit by the Milicenso Trojan. According to Symantec …
Malware-as-a-service allows victim management
A big amount of the malware out there are RAT (Remote administration tool) samples. This is software created by people specialized on it, people that develop, improve and sell …
PayPal sets up bug bounty program
Joining the likes of Google, Facebook, Mozilla and others, PayPal has announced that it will be offering money for information about security bugs that affect their site …
Rising malware threat for banking credentials
AhnLab cautioned against increasing variations of SpyEye trojan and ZeuS bot that attempt to steal personal banking information all over the world. Lately, the AhnLab Security …
Smart TVs are vulnerable to attacks
Home entertainment has expanded beyond the traditional television. Modern TV sets are very similar to a desktop computer: they have a processor, memory, a hard disk and some …
User education essential against social engineering attacks
The five-year analysis of data from Google’s Safe Browsing service shows that the threat landscape of today has evolved considerably from that of just five years ago, …
Belkin releases 802.11ac Wi-Fi dual-band AC+ Gigabit routers
Belkin launched its new line of advanced wireless routers featuring 802.11ac technology for speeds up to three times faster than existing 802.11n technology. Featuring …
Introducing Windows Server 2012
Get a head start evaluating Window Server 2012 with technical insights from a Microsoft MVP who’s worked extensively with the beta release. This practical introduction …
Real-time alert system shows active cyber attacks in 3D
A solution to the problem of how to spot cyber attacks on a network as soon as they have begun might just be coming from Japan, reports DigInfo TV. Researchers from the …
AutoCAD worm steals blueprints, sends them to China
Duqu and Flame are not the only pieces of malware interested in grabbing AutoCAD files, says ESET researcher Righard Zwienenberg. A sudden spike on ESET’s LiveGrid Early …
Windows 8 will be harder to exploit
A lot of things have already been revealed about the security features of the upcoming Windows 8: there will be a picture password sign in option; a built-in antivirus …
LinkedIn hit with class action suit following password leak
It seems that LinkedIn can’t catch a break these days. Following the discovery that its mobile app for iOS devices is sending potentially confidential information to the …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance