Post Thumbnail

Highly sophisticated malware isn't limited to relatively high-profile sabotage code like Stuxnet -- sometimes, it's designed to fly well under the radar. Symantec has discovered Regin, a very complex trojan that has been spying on everyone from governments to individuals since at least 2008. The m

1 month ago 0 Comments
November 23, 2014 at 6:58PM
Post Thumbnail

Hong Kong's pro-democracy protesters have more to worry about than they thought -- someone is gunning after their phones, too. Lacoon Mobile Security says it has detected new spyware, Xsser, that tries to trick WhatsApp users on Android and iOS by posing as a coordination tool for the Occupy Centr

2 months ago 0 Comments
Post Thumbnail

Cyberwarfare campaigns against Western energy grids aren't just the stuff of action movies these days -- they're very, very real. Symantec has discovered a likely state-sponsored hacking group, nicknamed Dragonfly, that has been using phishing sites and trojans to compromise energy suppliers in t

6 months ago 0 Comments
Post Thumbnail

Malware certainly exists for Linux, but it's more frequently targeted at servers than everyday PCs. Unfortunately, regular users now have more reason to worry: a rare instance of a Linux desktop trojan, Hand of Thief, has surfaced in the wild. The code swipes banking logins and other web sign-in d

1 year ago 0 Comments
Post Thumbnail

Folks still rocking Apple's Leopard may have been feeling left out after Lion and Snow Leopard both got an update for addressing that Flashback malware. If you're one of them, you'll be glad to know that Apple has finally issued a Leopard fix that comes with a removal tool for the vulnerability af

2 years ago 0 Comments
Post Thumbnail

Hide your kids, hide your wife, there's an asteroid circling Earth's orbit and we're all gonna... be just fine? Yeah, no need to stock up those '60s fallout shelters folks, this approximately 1,000 feet wide space rock is sitting pretty and safe in one of our Lagrange points. The so-called Trojan

3 years ago 0 Comments
Post Thumbnail

See that chart up there? That's a beautiful visualization of a dozen folk models surrounding the idea of home computer security, devised by Michigan State's own Rick Wash. To construct it (as well pen the textual explanations to back it), he interviewed a number of computer users with varying level

3 years ago 0 Comments
Post Thumbnail

There's no such thing as a perfect mobile app store strategy -- you're either too draconian, too arbitrary, or too loose in your policies, and as far as we can tell, there's no way to find a balance that isn't going to trigger an alarm here and there or get a few people worked into a lather. If you'

4 years ago 0 Comments
Post Thumbnail

If the online chatter is to be believed, Apple's very soon to be released Snow Leopard has in its code new protection for fighting malware. According to the picture above corroborated by other online reports, a DMG downloaded by Safari was checked by the OS and found to contain the \"RSPlug.A\" Troja

5 years ago 0 Comments