Possibilities for Malicious Browser Extensions Are Almost Infinite, Researcher Says

Possibilities for Malicious Browser Extensions Are Almost Infinite, Researcher Says

These components can be far more dangerous than what we've seen so far

Many of the Android Apps Using SSL Vulnerable to MITM Attacks, Experts Find

Many of the Android Apps Using SSL Vulnerable to MITM Attacks, Experts Find

Researchers performed an analysis with the aid of a tool called MalloDroid

Sites of Indian Mobile Operators Idea, Tata and BSNL Contain Serious Vulnerabilities

Sites of Indian Mobile Operators Idea, Tata and BSNL Contain Serious Vulnerabilities

Security researcher Prashant Uniyal explains why these flaws are so dangerous

Cybercriminals Found to Sell Access to Servers Housed by Fortune 500 Companies

Cybercriminals Found to Sell Access to Servers Housed by Fortune 500 Companies

The machines have been compromised because they have weak RDP passwords

.Gov URLs Used to Advertise “Make Money” Scam, over 43,000 Victims Recorded

.Gov URLs Used to Advertise “Make Money” Scam, over 43,000 Victims Recorded

Symantec experts explain how cybercriminals can pull off such a stunt

Experts Develop Malware That’s Capable of Bypassing Antivirus Solutions

Experts Develop Malware That’s Capable of Bypassing Antivirus Solutions

Complicated tasks are achieved by utilizing simple methods

The DHS Wants to Introduce the Advanced Bottled Liquid Scanner

The DHS Wants to Introduce the Advanced Bottled Liquid Scanner

The agency wants a prototype to be ready in three years

MUSTAN Malware Avoids Infecting Certain Files to Hide Its Presence

MUSTAN Malware Avoids Infecting Certain Files to Hide Its Presence

Trend Micro experts have analyzed this interesting threat

Fake Lookout Mobile Security Update Steals Files from Android Users

Fake Lookout Mobile Security Update Steals Files from Android Users

Researchers say that the malware is part of a larger attack

Citadel Trojan Rain Edition Represents Fraud-as-a-Service at Its Best, RSA Says

Citadel Trojan Rain Edition Represents Fraud-as-a-Service at Its Best, RSA Says

Some new features have been added, but the price has also gone up

Experts: miniFlame Is Similar to PlugX and PoisonIvy, Not a Threat to Regular Users

Experts: miniFlame Is Similar to PlugX and PoisonIvy, Not a Threat to Regular Users

The malware's capabilities are not so different from the ones of other backdoor threats

Hackers Could Hijack Pacemakers and Remotely Deliver Deadly Electric Shocks

Hackers Could Hijack Pacemakers and Remotely Deliver Deadly Electric Shocks

Security researcher Barnaby Jack unveiled his findings at the BreakPoint conference

Expert Explains How Facebook Users End Up with Shady Video Links on Their Walls

Expert Explains How Facebook Users End Up with Shady Video Links on Their Walls

Security researcher Troy Hunt shows the inner workings of a worm

Hackers Can Bypass PayPal’s Token-Based 2FA via the Password Reset Function

Hackers Can Bypass PayPal’s Token-Based 2FA via the Password Reset Function

Researchers stress that cybercriminals can access the accounts by using spyware

Windows Help Files Used in Attacks Against Industry and Government Sectors

Windows Help Files Used in Attacks Against Industry and Government Sectors

Cybercriminals rely on a cool trick to execute code and install malware

Steam Browser Protocol Flaws Allow Cybercriminals to Execute Malicious Commands

Steam Browser Protocol Flaws Allow Cybercriminals to Execute Malicious Commands

Experts have published a video proof-of-concept to demonstrate their findings

Multiplatform Jacksbot Malware Steals Minecraft Passwords, Other Information

Multiplatform Jacksbot Malware Steals Minecraft Passwords, Other Information

Intego experts have analyzed a new variant of the Trojan

 
Want more? Browse: