Opfake malware being disguised in Android games
Symantec researchers recently discovered several dummy sites being used to peddle the Android.Opfake malware, which is being disguised as games such as Temple Run and Cut the Rope.
More results...
Symantec researchers recently discovered several dummy sites being used to peddle the Android.Opfake malware, which is being disguised as games such as Temple Run and Cut the Rope.
China mobile phone maker ZTE admitted that one of its mobile phone models sold in the US contains a backdoor that could enable someone to take control of the device.
We have known for many years that the EU is not happy with the UK’s implementation of the Data Protection Directive – what we haven’t known is why. This may now change thanks to the persistence of Amberhawk Training Ltd.
This week both the The Pirate Bay and WikiLeaks have been ‘taken down’ by sustained DDoS attacks: TPB for over 24 hours, and Wikileaks for 72. What isn’t known is who is behind the attacks.
BYOD isn’t simply a security issue – it’s a job issue. Sales of multi-function smartphones and tablets are reducing demand for traditional PCs; and this is hitting Hewlett Packard.
A UK council is objecting to a 70,000-pound fine levied by the Information Commissioner’s Office (ICO) for losing sensitive data as the result of a theft at an employee’s home.
US high-tech firms have teamed with German research institute Fraunhofer FOKUS to open a cybersecurity research center in Berlin.
Government databases are full of highly prized and highly sensitive personal information. The upcoming Communications Bill will generate one of the very largest databases. The government says it will not include personal information.
Mobile Spy is covert spyware designed to allow parents to monitor their children’s smartphones, employers to catch time-wasters, and partners to detect cheating spouses. But vulnerabilities mean the covertly spied-upon can become the covert spy.
US security firm McAfee recently uncovered several ready-to-use toolkits that enable hackers to redirect unsuspecting Pinterest users to malicious websites with only a couple lines of code.