The impact of hacked SIM cards, one of the few stalwarts in the high-tech industry that has not seen a serious exploit, could be monumental.
New vulnerability found in Java 7 opens door to 10-year-old attack, researchers say
The vulnerability was reported Thursday to Oracle along with proof-of-concept (PoC) exploit code.
Unusual file-infecting malware steals FTP credentials, researchers say
A new version of a file-infecting malware program that’s being distributed through drive-by download attacks is also capable of stealing FTP (File Transfer Protocol) credentials.
Dropbox, WordPress used in cyber-espionage campaign
The Chinese cyber-spies behind the widely publicised espionage campaign against The New York Times have added Dropbox and WordPress to their bag of spear-phishing tricks.
Researchers find another Android attack that can get past signature checks
A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
Google: Critical Android security flaw won't harm most users
A security flaw could affect 99 percent of Android devices, a researcher claims, but the reality is that most Android users have very little to worry about.
'Darkleech' malware undertakes ransomware campaign
A persistent, widespread malware campaign that utilises compromised Apache servers is locking users’ computers and demanding a fee of $300 to free their data.
Largest ever DDoS attack directed at financial firm, Prolexic reports
DDoS attackers attempted to bring down an unnamed financial services firm earlier this week using one of the largest traffic …
Three alternatives to Adobe Reader
Another day, another critical security exploit discovered for Adobe Reader. The PDF software’s near-ubiquitous presence has made it a big, fat, …
Adobe Reader exploit ‘part of cyber espionage operation’
The head of the malware analysis team at antivirus vendor Kaspersky said last week that a recently found exploit that …