It has an arsenal of privilege escalation exploits, which is used to install a rootkit on the device so it can persist even after the user uninstalls it.
Danish Post Office Spam Scam Delivers Cryptolocker 2
The campaign is part of a long list of cyber-attacks that target one country at a time, at different time intervals, and use the same tactic.
New Sharking Trojan Targets Online Poker Players
Malware designed to sneak a peek at your hand
Cyber-risk Knowledge Gap Widens Between C-Suite and IT
IT and security professionals are doing a terrible job at communicating risk, bogged down in technical jargon and a lack of business context.
Ponemon: US Cyber-resilience is Poor to Nonexistent
Three-quarters of US organizations are not prepared to respond to cyber-attacks, leaving them more vulnerable than ever.
Brits Trust NHS on Data Privacy but Not IoT Firms
KPMG finds private firms have a long way to go to win consumer trust
California Hackers Said to Hit Kremlin with DDoS
Given the nation’s big election, the attack was likely hactivist motivated.
BCS Urges Personal Data Sharing Revamp
Amid fears of government snooping, the data revolution has created a ticking time bomb; sharing personal data is simply not working for anyone at the moment.
G DATA Adds Encryption for Secure Mobile Chat
Secure Chat, initially available for Android, offers multiple-encrypted SMS and chat communication, and file-sharing.
Non-Criminal Cyber Activists a Major Threat to Businesses – Cloudsec
PwC legal experts predicts “sausage factory” of privacy claims and disputes