malicious software

malicious software

Juniper sees shift from 'proof of concept to profitability' in mobile malware
Java-based cyberattack hits developers at Microsoft, Facebook, Apple
Researchers Turn The Tables On A Hacker, Infecting His PC With Malware And Grabbing Video Of Him At Work

Beware of Malware: Mobile Security Apps to Safeguard Your Phone

allthingsd.com
If you think that only computers can get viruses, think again. According to a report by research group Juniper Networks, hackers are increasingly targeting smartphones and other mobile devices with malicious software (also known as malware) to gain access to personal information. The threat is still small in comparison to...
Beware of Malware: Mobile Security Apps to Safeguard Your Phone

Apple pushes out Java security update

www.appleinsider.com
Apple has released a security update to plug a number of holes that allowed malicious software to run on a user's Mac outside of the Java sandbox....
Apple pushes out Java security update

Samsung Smart TVs: The next frontier for data theft and hacking [video]

bgr.com
Smart TVs, particularly Samsung’s (005930) last few generations of flat screens, can be hacked to give attackers remote access according to a security startup called ReVuln. The company says it discovered a “zero-day exploit” that hackers could potentially use to perform malicious activities that range from stealing accounts linked through apps to...
Samsung Smart TVs: The next frontier for data theft and hacking [video]

Malicious software infecting more Androids, and even Apple finds it’s not immune

www.washingtonpost.com
About two weeks ago, something shocking happened. Apple’s OS X, which has long been thought of as nearly impervious to malware or viruses, was hit with a big, nasty piece of malicious software called Flashback. Read full article >>...
Malicious software infecting more Androids, and even Apple finds it’s not immune

New Microsoft security defense to take aim at potent exploit technique

arstechnica.com
Microsoft engineers plan to adopt new security defenses that will help their software better withstand a powerful exploitation technique hackers are increasingly using to install malware on end users' computers. The technique, known as ROP (return oriented programming), is a regular staple of attacks used at the annual Pwn2Own hacker...
New Microsoft security defense to take aim at potent exploit technique

Reading the tea leaves on app sandboxing in OS X

gigaom.com
Apple has pushed back, for the second time, the date by which all apps submitted to the App Store must be sandboxed in OS X. While the original deadline was moved from Nov. 1, 2011 to March 1, it has now been pushed forward again to June 1. Sandboxing, a...
Reading the tea leaves on app sandboxing in OS X

Identity fraud in U.S. is on the rise, report

news.cnet.com
Scammers are increasingly gaining access to people's personal information through data breaches and malicious software attacks. [Read more]...
Identity fraud in U.S. is on the rise, report

Like Facebook and Twitter, Microsoft was also hacked

www.geekwire.com
Microsoft has revealed that, just like Facebook and Apple earlier this week, it too was victim to hacking. Matt Thomlinson, general manager of Trustworthy Computing Security at Microsoft, just wrote a blog post about this. Due to Microsoft protocol, the Redmond software giant didn’t make any public statements as they figured...
Like Facebook and Twitter, Microsoft was also hacked

Malware Automates Storing of Data Haul on File-hosting Site SendSpace

www.pcworld.com
Trend Micro researchers have discovered a piece of malicious software that automatically uploads its stolen data cache to the SendSpace file-sharing service for......
Malware Automates Storing of Data Haul on File-hosting Site SendSpace
How an Internet-connected Samsung TV can spill your deepest secrets

Attackers sign malware using crypto certificate stolen from Opera Software

arstechnica.com
Alan Cleaver Hackers penetrated network servers belonging to Opera Software, stole at least one digital certificate, and then used it to distribute malware that incorrectly appeared to be published by the browser maker. The attack was uncovered, halted, and contained on June 19, according to a short advisory that Opera...
Attackers sign malware using crypto certificate stolen from Opera Software

Microsoft Hacked, Just Like Facebook and Apple

allthingsd.com
On Friday evening, Microsoft announced via its security blog that it, too, had been victim of a cyberattack, comparing its situation to the likes of Facebook and Apple’s recent security breaches. “During our investigation, we found a small number of computers, including some in our Mac business unit, that were...
Microsoft Hacked, Just Like Facebook and Apple

Samsung Develops Software Update for Galaxy Malware

blogs.wsj.com
Samsung Electronics Co. said it is developing a software update to address a vulnerability in its Galaxy smartphones and tablets that could allow malicious software, or malware, to target the core operations of the chip that runs them....
Samsung Develops Software Update for Galaxy Malware

In a Twist, Anonymous Supporters Hit by Cybercriminals

www.pcworld.com
New research from Symantec illustrates how cybercriminals rarely pass an opportunity to infect batches of computers with malicious software, even if it means......
In a Twist, Anonymous Supporters Hit by Cybercriminals
DSL modem hack used to infect millions with banking fraud malware
Are third-party security apps still necessary with Android 4.2?

The Constitution and the 3D Printed Plastic Pistol

techcrunch.com
The Liberator’s 3D-printed parts By now, you have probably heard about the Liberator, a 3D printed plastic gun designed, assembled, and test-fired by Cody Wilson of Defense Distributed. Is it legal? Last week, the State Department’s arms export office demanded that Defense Distributed remove CAD files for the Liberator from...
The Constitution and the 3D Printed Plastic Pistol

Google's new search algorithm to crack down on "black hat webspam"

arstechnica.com
Nefarious search engine optimizers be warned. Google is coming for you-again. Following previous changes to Google's ranking and page layout algorithms, the search giant is pushing yet another update to its algorithm this week with the hopes of curbing "black hat webspam" from creeping into search results. The change...
Google's new search algorithm to crack down on "black hat webspam"

NBC.com hacked to serve up banking malware

www.pcworld.com
Websites affiliated with U.S. broadcaster NBC were hacked for several hours on Thursday, serving up malicious software intended to steal bank account details. On its own technology blog, NBC released a statement saying, “We’ve identified the problem and are working to resolve it. No user information has been compromised.â€...
NBC.com hacked to serve up banking malware

Seculert Gets $5.35 Million Investment For Cloud-Based Botnet Detection Service

techcrunch.com
Seculert has raised a $5.35 million round of funding today led by Norwest Venture Partners for the Israeli company’s next generation advanced threat detection service. The company’s software-as-a-service detects back doors in your network, discovering malware attacks that have previously gone undetected. As much as the cloud is for developing...
Seculert Gets $5.35 Million Investment For Cloud-Based Botnet Detection Service

Apple Employees' Macs Compromised by Chinese Hackers

www.macrumors.com
A number of Macs owned by Apple employees were compromised by the same China-based hackers that targeted Facebook employees recently, reports Reuters. The news agency says Apple disclosed the breach to its reporters. Apple, which is working with law enforcement to track down the hackers, told Reuters that only a...
Apple Employees' Macs Compromised by Chinese Hackers

Yes, Your Phone Can Get A Computer Virus (AAPL, GOOG)

www.businessinsider.com
If you thought your phone was virus-proof, think again. Smartphones are essentially portable personal computers. And while their operating systems are in many ways more modern and secure than desktop-computer operating systems, they're still vulnerable. How vulnerable? Last year, researchers detected 24,794 threats to mobile phones, according to security-software vendor...
Yes, Your Phone Can Get A Computer Virus (AAPL, GOOG)

Microsoft leads seizure of Zeus-related cybercrime servers

www.computerworld.com
Microsoft said on Monday it and several partners had disrupted several cybercrime rings that used a notorious piece of malicious software called Zeus to steal US$100 million over the last five years....
Microsoft leads seizure of Zeus-related cybercrime servers

Critical Java zero-day bug is being "massively exploited in the wild"

arstechnica.com
A previously unknown and currently unpatched security hole in the latest version of the Java software framework is under attack online, according to security researchers and bloggers. Attack code that exploits the vulnerability has been added to the Blackhole, Cool, Nuclear Pack, and Redkit exploit kits, according to the...
Critical Java zero-day bug is being "massively exploited in the wild"

Security! Android’s Bouncer to prevent malware from making it to the Market

venturebeat.com
Whether accurate or exaggerated, claims of rampant malware apps have haunted the Android Market. Now, Google’s Android team is announcing Bouncer, a new security mechanism that should prevent bad apps from ever making it into the Market. It’s a programmatic solution that’s allegedly good for both the goose (or users,...
Security! Android’s Bouncer to prevent malware from making it to the Market

Less than 24 hours after last patch, criminals were selling a new Java exploit for $5,000 per buyer

thenextweb.com
Here we go again? On Sunday, Oracle released Java 7 Update 11 to address a recently disclosed security vulnerability which allowed attackers to execute malicious software on a victim’s machine. On Monday, criminals in the Underweb were reportedly selling an exploit for a different 0day vulnerability (previously unknown and thus...
Less than 24 hours after last patch, criminals were selling a new Java exploit for $5,000 per buyer
Apple Employees Hacked By Visiting iPhonedevsk
× Just a test of the new info bar. What do you think?