We’re not in Kansas anymore: The third quarter of 2012 saw a marked increase in Android adware, while new evidence surfaced suggesting that the Zeus-in-the-Mobile (Zitmo) banking trojan is evolving into a botnet. And, Romanian hackers are continuing to…
RSA Europe 2012: DDoS Attacks Used as Diversion Technique
DDoS attacks are being used as a component in the newly emerged multi-flank attacks, Symantec’s deSouza told his audience at RSA Europe 2012 in London, 09 October 2012.
RSA Europe 2012: Replace perimeter-based security with intelligence-based security, says Art Coviello
Art Coviello, executive vice president , EMC Corporation and executive chairman, RSA, opened RSA 2012 with a very clear message in his keynote: perimeter-based security strategies need to be replaced with intelligence-based strategies.
Bad Bad Piggies – beware of fakes
No slouches in spotting an opportunity, the bad guys have already focused on Rovio’s new Angry Birds spin-off, Bad Piggies. Be careful what you install – it might be a real pig.
Mac-focused malware is big and getting bigger
Despite the Mac reputation as being more secure because of Apple’s tight control over its vertically integrated ecosystem, Mac-specific malware and advanced persistent attacks (APTs) against human rights groups is on the rise, cautions Citizen Lab Seni…
World of Warcraft hit by hacking massacre
Apocalypse has come to World of Warcraft: whole cities have been massacred in the online adventure game, leaving nothing but smoking wreckage.
The 2012 Cost of Cyber Crime Report Says Successful Attacks Doubled
The 2012 Cost of Cyber Crime study is published today. It’s good news and bad news. The frequency of successful cyber attacks has more than doubled over the last three years, but the annual cost to organizations has slowed dramatically in the last two …
DarkAngle trojan masquerades as Panda Cloud AV
In a new twist to ‘rogueware’, Panda Security has warned that its cloud antivirus product name is being used to mask a particularly unpleasant trojan called DarkAngle. While victims may believe that they are installing anti-malware, they may actually b…
Microsoft will reject ‘weak’ digital certificates from tomorrow
A weak digital certificate is defined as one signed with an RSA key of less than 1024 bits. Since it is now generally accepted that keys of a lesser length can be brute-forced with modern computing power, Microsoft is upping the ante by forcing a move …
American think tanks hit in wide-scale cyber-espionage push
American think tanks are becoming a big intelligence target for hackers from China and other countries, according to Rep. Mike Rogers (R-Mich.), chairman of the US House Intelligence Committee.