Shanghai Officials Change iPhone, Samsung Phones for Alternative with Encryption Functionality

Shanghai Officials Change iPhone, Samsung Phones for Alternative with Encryption Functionality

Move made in the wake of recent news on iPhone being surveillance prone

Millions of Computers Have Backdoor Enabled by Default

Millions of Computers Have Backdoor Enabled by Default

Legitimate software behaves like malware, whitelisted by antivirus products

The FBI Relies on Malware to Catch Criminals

The FBI Relies on Malware to Catch Criminals

The bureau uses backdoors or special code to collect details identifying the machine

Microsoft Says the US Never Asked to Put a Backdoor in Its Software

Microsoft Says the US Never Asked to Put a Backdoor in Its Software

Company official says backdoors could destroy the whole business

New Trojan Infiltrates Korean Organization

New Trojan Infiltrates Korean Organization

Identifying the threat actor proves to be quite difficult

Apple Downplays Severity of “Backdoors” in iOS

Apple Downplays Severity of “Backdoors” in iOS

Company creates knowledge base page for hidden services in iOS

  • iWorld
  • By Adrian Boioglu
  • July 23rd, 2014
Apple Denies Backdoor Data Allegations, Calls Them "Diagnostic Capabilities"

Apple Denies Backdoor Data Allegations, Calls Them "Diagnostic Capabilities"

Apple was accused of letting government agencies have access to iOS

Backdoor Uploading Allowed by WPtouch Plugin for WordPress

Backdoor Uploading Allowed by WPtouch Plugin for WordPress

The component is very popular, has more than 5 million downloads

Kivars Malware Adapted for 64-bit Systems

Kivars Malware Adapted for 64-bit Systems

Slightly different from the 32-bit version, preserves functionality

CosmicDuke Malware Combines Components from Cosmu and MiniDuke

CosmicDuke Malware Combines Components from Cosmu and MiniDuke

Steals passwords and files, takes screenshots, logs keystrokes

Government Employees Targeted by Phishing Campaign

Government Employees Targeted by Phishing Campaign

Malware has evasion capabilities for specific security solution

US House Finally Takes Measures Against NSA Mass Surveillance

US House Finally Takes Measures Against NSA Mass Surveillance

The move cuts down funds for NSA's backdoors in hardware and imposes the need for warrant, but it may not be enough

Web Diary Professional Exploited by Cybercrooks

Web Diary Professional Exploited by Cybercrooks

Despite being obsolete, many admins cling to the vulnerable solution

Edward Snowden: Backdoors Planted by the NSA Can Also Be Leveraged by Others

Edward Snowden: Backdoors Planted by the NSA Can Also Be Leveraged by Others

The whistleblower has attended TED via a telepresence robot

Fake Video About Malaysian Airlines Flight MH370 Hides Malware

Fake Video About Malaysian Airlines Flight MH370 Hides Malware

The number of scams leveraging the story of the missing plane is growing

Cybercriminals Leverage Mass Stabbing in China to Distribute Gh0st RAT

Cybercriminals Leverage Mass Stabbing in China to Distribute Gh0st RAT

A backdoor is hidden inside a harmless-looking document file

Invitations for Grand Theft Auto 5 PC Beta Testing Hide Malware

Invitations for Grand Theft Auto 5 PC Beta Testing Hide Malware

Don’t trust websites or emails promising GTA 5 for PC

 
Want more? Browse: