Researchers quantify the promise and limits of new crypto hacking algorithms.
Hackers use royal baby news as social engineering lure
It may be old news now, but hackers are still using news of the royal baby’s birth to entice people into clicking on malicious links, according to researchers at Trend Micro.
Windows tablets capture more share, but Surface suffers
Windows’ share of the tablet market grew slightly in the second quarter, as shipments also ticked up in the face of a slow-down by tablets overall, researcher IDC said today.
New vulnerability found in Java 7 opens door to 10-year-old attack, researchers say
The vulnerability was reported Thursday to Oracle along with proof-of-concept (PoC) exploit code.
Signed Macintosh malware uses right-to-left override
Researchers at F-Secure have discovered malware targeting OS X, which leverages a technique called right-to-left override (RLO) in order to spoof its malicious nature.
Unusual file-infecting malware steals FTP credentials, researchers say
A new version of a file-infecting malware program that’s being distributed through drive-by download attacks is also capable of stealing FTP (File Transfer Protocol) credentials.
'Darkleech' malware undertakes ransomware campaign
A persistent, widespread malware campaign that utilises compromised Apache servers is locking users’ computers and demanding a fee of $300 to free their data.
Tablets in bed are damaging sleep and killing productivity
Right before bedtime, bright lights are the enemy, inhibiting the production of melatonin, which helps you fall (and stay) asleep.
With Carberp source code’s release, security pros expect the worst
With the previously $40,000 Carberp Trojan’s source code now freely available, experts expect exceptionally destructive variants of the malware to flow onto the Internet.
Many companies are negligent about SAP security, researchers say
SAP has significantly improved the security of its products over the past few years but many of its customers are negligent with their deployments, which exposes them to potential attacks that could cripple their businesses, according to security researchers.