Security researchers have discovered a way to track a mobile phone user’s whereabouts without using a GPS signal, it was revealed this week. It is even possible to listen in on telephone voicemails, according to the information, divulged in a presentat…
McAfee security software flags Windows kernel code as malware
Reports are coming in that McAfee’s popular IT security software is tagging Microsoft Windows system files as malicious, causing serious stability problems, screen freezes and bootup loops for a large number of Windows XP users.
McAfee security software flags Windows kernel code as malware
Reports are coming in that McAfee’s popular IT security software is tagging Microsoft Windows system files as malicious, causing serious stability problems, screen freezes and bootup loops for a large number of Windows XP users.
Google fixes Chrome flaws
Google has closed four high-priority vulnerabilities in version 4 of its Chrome browser for Windows.
McAfee’s security software flags Windows kernel code as malware
Reports are coming in that McAfee’s popular IT security software is tagging Microsoft Windows system files as malicious, causing serious stability problems, screen freezes and bootup loops for a large number of Windows XP users.
Lib Dem Clegg’s infosec breach
The blueprint for Lib Dem Nick Clegg’s top-secret TV debate strategy has been found in the back of a London cab, The Sun reports
Clearswift reports a seachange in Web 2.0 business security attitudes
Research published today claims to show that business attitudes towards Web 2.0 – the new generation of internet services – have charged markedly in the last three years.
Trusteer detects rapid spread of new polymorphic Zeus trojan
Trusteer says it has detected a completely new version of the Zeus password stealing trojan that has been designed to steal online banking credentials.
UN rejects international cybercrime treaty
The United Nations has rejected a Russia-backed proposal for a treaty on cybercrime, despite widespread agreement that closer international co-operation is vital in a world more closely connected by global computer networks.
Hackers stole Google password program
The hackers responsible for the Operation Aurora attack against Google also managed to compromise its single sign-on password system, according to a report in the New York Times this week. The attack, which happened in December, targeted a highly secre…