Archive | Malware RSS feed for this section

Google offers $1 million in exploit rewards for Chrome hacks

Posted  February 28, 2012 Google is offering cash prizes totaling $1 million to hackers, plus a Chromebook, for those who successfully exploit its Chrome browser at the CanSecWest security conference next week. Read all about it on Naked Security. 

Leave a comment Continue Reading →

25 ‘VeriSign Trusted’ shops found to have XSS holes

Posted February 28, 2012 A grey hat hacker has discovered cross-site scripting (XSS) holes in 25 UK online stores that are certified as safe by the likes of VeriSign, Visa, and MasterCard. Read the full story on Naked Security.

1 Comment Continue Reading →

Is Digital Pearl Harbor THE most tasteless term in IT security?

Posted February 9, 2012 Can hackers really cause as much bloodshed as 353 Imperial Japanese Navy fighters, bombers and torpedo planes launched from six aircraft carriers? Can hackers really kill 2,402 U.S. citizens, leave 1,282 wounded, lose 65 of their own attackers in the process, and plunge the United States into a World War? No? Then […]

Leave a comment Continue Reading →

USA to equip military, government officials with Androids

Posted February 6, 2012 The United States is preparing a modified version of Google’s Android operating system to allow soldiers to use smartphones. Read the story on Naked Security.

Leave a comment Continue Reading →

Don’t get slammed by Super Bowl scams

Posted February 2, 2012 The countdown to first kickoff in Super Bowl XLVI on February 5 has begun, and scams for knock-off team jerseys, counterfeit memorabilia, and fake YouTube videos will be sure to hammer our defenses. Here’s the article. 

Leave a comment Continue Reading →

Alleged Russian cybercriminal extradited to the US

Posted January 19, 2012 A suspected Russian cybercriminal arrived in Manhattan on Tuesday to face charges of security fraud, computer hacking and ID theft after being deported from Switzerland. Read all about it. 

Leave a comment Continue Reading →

Trojan may have stolen data from Japanese space agency

Posted January 18, 2012 A data-stealing Trojan horse may have smuggled out login information to gain access to a cargo shuttle that carries food and equipment to the International Space Station (ISS). Read the full story here.

Leave a comment Continue Reading →

SpyEye bank Trojan hides its fraud footprint

Posted January 5, 2012 The latest variants of the information-stealing SpyEye Trojan are now specializing in hiding fraudulent transactions from your online banking statements. Should we rethink giving up on our paper statements? Here’s the full story. 

Leave a comment Continue Reading →

Researchers: Google gamed browser report that dissed Firefox

Posted December 16, 2011 Surprise, surprise: It turns out that the Google-sponsored study that painted Firefox in a poor light might have been influenced by the sponsor. Check out the story at Naked Security.

Leave a comment Continue Reading →

In God We Trust, but Security Vendors Need to Sign the Papers

If Anonymous, LulzSec et al. can pwn security vendors, who can protect us? Here’s help on how to rate security vendors on the sitting-duck scale. In this two-part look at how to vet security vendors, my first article—In God We Trust, but Security Vendors Need to Sign the Papers—focuses on assessing a vendor. This is done […]

Leave a comment Continue Reading →