security vendor

security vendor

Android threats growing in number and complexity, report says

www.pcworld.com
The Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused malware services, according to a report from Finnish security vendor F-Secure.The number of mobile threats has increased by nearly 50 percent during the first three months of 2013, from...
Android threats growing in number and complexity, report says

Deutsche Telekom Aims to Lookout for Mobile Users' Security

allthingsd.com
Deutsche Telekom is partnering with mobile security vendor Lookout to ensure that T-Mobile customers are better protected against viruses and other threats. The German telecommunications firm is working with the security start-up to protect its large base of European Android users. “We see a growing challenge to how we can...
Deutsche Telekom Aims to Lookout for Mobile Users' Security

Study finds 25 percent of Android apps to be a security risk

www.pcworld.com
According to a new report from Bit9--a security vendor with a focus on defending against advanced persistent threats (APT)--there is a one in four chance that downloading an Android app from the official Google Play market could put you at risk. Bit9 analyzed 400,000 or so apps in Google...
Study finds 25 percent of Android apps to be a security risk

South Korea Cyber Attack Heightens Tensions In Hair-Trigger Region

readwrite.com
No one is at all clear at all about the origins of a purported cyber attack against South Korean media and financial organizations yesterday, which left broadcaster and bank networks paralyzed for hours. The obvious culprit is a state-sponsored attack from North Korea, but even if that nation isn't directly...
South Korea Cyber Attack Heightens Tensions In Hair-Trigger Region

You Don't Happen To Follow This Twitter Account From 2007, Do You?

www.businessinsider.com
The oldest known fake Twitter account @krails was created on Jan 15th, 2007.  You don't happen to follow it, do you? Twitter suspends fake accounts when it finds them. Problem is, it can't always find them. The news that this account was fake first broke on Friday. That's when Jason...
You Don't Happen To Follow This Twitter Account From 2007, Do You?

Bogus Chrome update offers shadow real updates

www.csoonline.com
Google's recent upgrade of Chrome has sparked a new round of bogus updates of the Web browser from cybercriminals hoping to steal online banking credentials and perform other mayhem. Google released its upgrade Thursday, providing users with higher performing software and patching two-dozen security vulnerabilities. Because Google usually refreshes...
Bogus Chrome update offers shadow real updates

Dell to buy security vendor Credant

www.computerworld.com
Dell has made a deal to acquire data-protection vendor Credant Technologies and plans to add the company's technology to its enterprise IT security offerings....
Dell to buy security vendor Credant

Android threats growing in number and complexity, report says

www.computerworld.com
The Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused malware services, according to a report from Finnish security vendor F-Secure....
Android threats growing in number and complexity, report says

McAfee antivirus update causes problems for home and enterprise customers

www.computerworld.com
A buggy update released Friday by security vendor McAfee for its consumer and enterprise antivirus products, left the computers of its customers unprotected and, in some cases, unable to access the Internet....
McAfee antivirus update causes problems for home and enterprise customers

Cybercriminals are increasingly abusing .eu domains in attacks

www.pcworld.com
Cybercriminals are increasingly using .eu domain names in their attack campaigns, according to data from multiple security companies. "Numerous malicious .eu domains have been registered during November which are being used to infect PCs with malware via the Blackhole exploit kit," said Fraser Howard, principal virus researcher at security...
Cybercriminals are increasingly abusing .eu domains in attacks

Symantec Warns of Android Trojans That Mutate With Every Download

www.pcworld.com
Researchers from security vendor Symantec have identified a new premium-rate SMS Android Trojan horse that modifies its code every time it gets downloaded....
Symantec Warns of Android Trojans That Mutate With Every Download

How To Make Your Facebook Account More Secure [Video]

www.readwriteweb.com
Over the last couple of years, Facebook has made great strides in security and privacy. But to ensure the right level of security for you, both casual and avid users need to understand the giant social network's security options. Security vendor Kaspersky Lab posted this week a how-to video on...
How To Make Your Facebook Account More Secure [Video]

Mobile malware cases nearly triple in first half of 2012, says NetQin

www.computerworld.com
Mobile malware is rising fast, infecting nearly 13 million phones in the world during the first half of 2012, up 177% from the same period a year ago, according to Beijing-based security vendor NetQin....
Mobile malware cases nearly triple in first half of 2012, says NetQin

McAfee Antivirus Update Causes Problems for Home and Enterprise Customers

www.pcworld.com
A buggy update released Friday by security vendor McAfee for its consumer and enterprise antivirus products, left the computers of its customers unprotected and......
McAfee Antivirus Update Causes Problems for Home and Enterprise Customers

IE exploit distributes PlugX malware, researchers say

www.pcworld.com
Researchers from security vendor AlienVault have identified a variant of a recently discovered Internet Explorer exploit that is used to infect targeted computers with the PlugX remote access Trojan (RAT) program. The newly discovered exploit variant targets the same unpatched vulnerability in IE 6, 7, 8 and 9 as...
IE exploit distributes PlugX malware, researchers say

Spam levels still low a year after Rustock botnet takedown

arstechnica.com
In March 2011, a Microsoft-led team targeted and decapitated the Rustock botnet, and a dramatic decrease in spam traffic was noticed almost immediately. It turns out that a full year later, spammers have not been able to fill the gaping hole left by Rustock's absence. Just before the Rustock...
Spam levels still low a year after Rustock botnet takedown

Guardian Analytics Launches Fraud Detection Software for Mobiles

www.pcworld.com
Security vendor Guardian Analytics launched on Tuesday a product for financial institutions that detects possible fraudulent online banking transactions executed......
Guardian Analytics Launches Fraud Detection Software for Mobiles

LinkedIn user alerts mistakenly blocked as spam

www.computerworld.com
Many of the LinkedIn emails alerts instructing users on how to reset passwords accessed by hackers were dumped into spam boxes, according to email security vendor Cloudmark....
LinkedIn user alerts mistakenly blocked as spam

Microsoft buys security vendor PhoneFactor

www.computerworld.com
Microsoft has bought multi-factor authentication specialist PhoneFactor with the goal of integrating the company's technology into its cloud services and on-premises applications....
Microsoft buys security vendor PhoneFactor

Twitter Has A Big Problem With Fake User Accounts

www.businessinsider.com
Everyone knows there's a sordid industry around selling Twitter followers. But on Friday, Jason Ding, a researcher from security vendor Barracuda Networks, quantified how bad the problem is for Twitter and how these guys fly under the radar.  For 75 days, Ding investigated the fake Twitter account business. He and...
Twitter Has A Big Problem With Fake User Accounts

Pacemaker hack can kill via laptop

www.techhive.com
Pacemakers from several manufacturers can be commanded to deliver a deadly, 830-volt shock from someone on a laptop up to 50 feet away, the result of poor software programming by medical device companies. The new research comes from Barnaby Jack of security vendor IOActive, known for his analysis of...
Pacemaker hack can kill via laptop

AVG releases free 'TuneUp' application for Android devices

www.pcworld.com
Security vendor AVG has released an application for Android that lets users adjust power settings and manage applications to conserve battery power.TuneUp for Android, which is in Google's Play store, is free. The power controls can be used to turn off certain phone functions in case the battery is...
AVG releases free 'TuneUp' application for Android devices

Symantec Clears pcAnywhere for Use

www.pcworld.com
The security vendor took the unusual step of urging users to disable the program after claims that a hacker group was mining stolen source code for vulnerabilities....
Symantec Clears pcAnywhere for Use

Bit9 says attack likely targeted a narrow set of companies

www.computerworld.com
Security vendor Bit9 promised to release limited details of a hack caused by a failure of the company to install the same security software on its own network that it sells to a handful of Fortune 500 companies....
Bit9 says attack likely targeted a narrow set of companies

New APT malware monitors mouse clicks to evade detection, researchers say

www.computerworld.com
Researchers from security vendor FireEye have uncovered a new APT that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the infected computer....
New APT malware monitors mouse clicks to evade detection, researchers say

New IE exploit variant distributes PlugX malware, researchers say

www.computerworld.com
Researchers from security vendor AlienVault have identified a variant of a recently discovered Internet Explorer exploit that is used to infect targeted computers with the PlugX remote access Trojan (RAT) program....
New IE exploit variant distributes PlugX malware, researchers say

Security Vendor Exposes Vulnerabilities in DDoS Rootkit

www.pcworld.com
In what it says is an attempt to turn the tables on malicious hackers, security vendor Prolexic on Tuesday released details of vulnerabilities it has discovered in a toolkit family used by hackers to launch distributed denial of service attacks against corporate networks....
Security Vendor Exposes Vulnerabilities in DDoS Rootkit

Report: Companies experience a malware event every three minutes

www.pcworld.com
Organizations face malware-related events that bypass traditional defense technologies on their networks every three minutes, according to a new report released Wednesday by security vendor FireEye. "This activity can include the receipt of a malicious email, a user clicking a link on an infected website, or an infected machine...
Report: Companies experience a malware event every three minutes

Cybercriminals bypass e-banking protections with fraudulent SIM cards

www.computerworld.com
Cybercriminals are impersonating victims in order to obtain replacement SIM cards from their mobile carriers, which they then use to defeat phone-based Internet banking protections, security vendor Trusteer said in a blog post....
Cybercriminals bypass e-banking protections with fraudulent SIM cards

Most IT, security pros see Anonymous as serious threat

www.computerworld.com
The majority of IT and security professionals believe that Anonymous and hacktivists are among the groups that are most likely to attack their organizations during the next six months, according to the results of a survey sponsored by security vendor Bit9....
Most IT, security pros see Anonymous as serious threat
× Just a test of the new info bar. What do you think?