- Security Blog
- By Eduard Kovacs
- September 25th, 2012
Bruce Schneier: Security Firms Are Not Financially Motivated to Stop Spam
The expert believes that spam should be deleted in the middle of the network
- Security Fixes and Improvements
- By Eduard Kovacs
- September 25th, 2012
Expert: USSD Codes Can Be Used to Remotely Reset Samsung Galaxy S3 Phones
Hackers can push the exploit via QR codes, websites, NFC, and WAP Push SMS
- Security Fixes and Improvements
- By Eduard Kovacs
- September 25th, 2012
One Billion Users Affected by Java Security Sandbox Bypass Vulnerability, Experts Say
Security Explorations identifies an issue that affects Java SE 5, 6 and 7
- Security Blog
- By Eduard Kovacs
- September 24th, 2012
Bruce Schneier on New Hash Algorithm (SHA-3): It’s Good, but We Don’t Need It
The expert highlights the fact that current functions are still secure
- Security Blog
- By Eduard Kovacs
- September 24th, 2012
Researchers Use NFC-Based Exploit to Ride the Subway for Free [Video]
This is possible because of a vulnerability in transit system access cards
- Virus alerts
- By Eduard Kovacs
- September 21st, 2012
Military, Energy and Oil Organizations Targeted in Mirage Campaign
The operation relies on spear phishing attacks aimed at company executives
- Security Fixes and Improvements
- By Eduard Kovacs
- September 21st, 2012
Passwords of Oracle Database Users Exposed Because of Logon Protocol Bug
Esteban Martinez Fayo of AppSec Inc developed a proof-of-concept tool for the flaw
- Virus alerts
- By Eduard Kovacs
- September 20th, 2012
Over 1 Million PCs Currently Part of ZeroAccess Global Botnet
The threat is helping cybercriminals earn as much as $100,000 (80,000 EUR) per day
- Security Fixes and Improvements
- By Eduard Kovacs
- September 20th, 2012
Users of Mobile Portals Exposed to HTTP Header Pollution Attacks, Expert Finds
The victim's phone number is enough for a cybercriminal to take over their account
- Security
- By Eduard Kovacs
- September 19th, 2012
PlugX RAT Developer Connected to “Network Crack Program Hacker” Group
He might be one of the creators of the famous GuiWui rootkit
- Virus alerts
- By Eduard Kovacs
- September 18th, 2012
Internet Explorer Zero-Day Exploited in Wild, Tied to Poison Ivy and Nitro Attacks
Microsoft is aware of the problem and is currently working on addressing it
- Virus alerts
- By Eduard Kovacs
- September 17th, 2012
Flame Has at Least Three More Brothers, Experts Found
Researchers have performed a thorough analysis of the threat's C&C servers
- Security Fixes and Improvements
- By Eduard Kovacs
- September 15th, 2012
WhatsApp Accounts Can Be Easily Hacked, Experts Say
A number of issues expose the app’s customers to hack attacks
- Virus alerts
- By Eduard Kovacs
- September 14th, 2012
Researchers Find Botnet C&C Servers Hidden in Tor Anonymity Network
Suriya Prakash provides details of the threat and why it's so difficult to stop it
- Security Blog
- By Eduard Kovacs
- September 14th, 2012
AlientVault Tracks Down Developer of PlugX RAT
He describes himself as a virus expert and an individual proficient in assembly
- Security Blog
- By Eduard Kovacs
- September 13th, 2012
Etsy Launches Security Bug Bounty Program
The minimum reward is $500 (400 EUR) and an Etsy Security Team T-shirt
- Virus alerts
- By Eduard Kovacs
- September 13th, 2012
Expert: Stuxnet Did Not Escape into the Wild
Professor Larry Constantine has an interesting theory regarding the infamous worm