Trend Micro spots Android malware acting as SMS relay
A Trend Micro security researcher claims to have discovered a new type of malware infection on the Google Android platform that acts as an SMS (text message) relay.
More results...
A Trend Micro security researcher claims to have discovered a new type of malware infection on the Google Android platform that acts as an SMS (text message) relay.
Building on a presentation he made at the Infosecurity Europe event in late April, Eugene Kaspersky, CEO of Kaspersky Lab, has warned of the danger that the internet could become a cyberconflict vehicle for governments to attack each other.
Travelodge has confirmed that a “small number” of customers have received a spam e-mail via a third party, but insists that no financial data is at risk.
The European Union (EU) is planning new legislation to mandate companies to publicly admit that they have suffered a data breach.
The reputation of the Russian ChronoPay e-money service has taken a further battering after a security researcher linked the co-founder of the service – who has apparently fled from Russia – with a distributed denial of service (DDoS) attack against a …
Users of the Installous software – an extensible code environment for jailbroken Apple iPhones – could be in for a shock if they are thinking of upgrading to a jailbroken version of iOS5, which is already doing the rounds of the iPhone cognoscenti.
Twin brothers Cameron and Tyler Winklevoss, who claim Mark Zuckerberg stole their idea for the social networking site Facebook, have abandoned legal attempts to renegotiate the original $65m settlement.
Authorities in Cyprus have shut down a major pirate TV operation that offered illegal subscriptions to BSkyB, Nova and BFBS payTV subscription services.
Hell hath no fury like a hacker scorned, it seems, as a Dutch hacking crew called TeaMp0ison has effectively declared a cyberwar between its members and the LulzSec hacktivist group.
A rising volume of research has suggested of late that internet users make frequent re-use of passwords, as well as using relatively weak passwords that are easy to brute force hack. Now a security researcher claims his research suggests that – irony o…