Attackers can use a file-sharing feature to access confidential info or serve targeted malware.
Malware No Longer Avoids Virtual Machines
Most enterprises are implementing virtualization, so malware authors are learning to write their code to attack that infrastructure more effectively.
Android RAT Krysanec Masquerades as Legit Apps
Undetected, the bug sets up a backdoor to siphon off all kinds of personal information.
LastPass Users Left in the Lurch After Massive Outage
Datacenter downer as firms are left unable to access key online accounts
Chinese Heart App Virus Slams 100,000 Android Phones
Malware written by software student spreads like wildfire in the Middle Kingdom.
2014 So Far: The Year of the Data Breach
Attacks are intensifying, and have already claimed 10 million personal records.
SecureAuth Adds Risk-based Authentication Scheme
Latest stab at “post-password” security adds live threat intelligence to the mix.
Xiaomi Issues Update After Data Privacy Concerns
MIUI Cloud Messaging made opt-in after negative feedback.
Need Data Breach Statute Compliance? There’s an App for That
Data Breach 411 for Apple OS gives executives all the state security breach statutes at their fingertips.
Click Fraud Malware Found Lurking Inside Image Files
Dell SecureWorks researchers warn of growing threat from digital steganographic techniques.