Internet of Things


492 articles

Malware

New ransomware uses webcam and Homeland Security threat to scare victims

New ransomware uses webcam and Homeland Security threat to scare victims

Malware

New ransomware uses webcam and Homeland Security threat to scare victims

A new ransomware infection scares its victims by invoking the name of the Department of Homeland Security, and the National Cyber Security Division - and frightens users further by posting a webcam picture.

Rob Waugh01 Aug 2013


Malware

Versatile and infectious: Win64/Expiro is a cross-platform file infector

Versatile and infectious: Win64/Expiro is a cross-platform file infector

Malware

Versatile and infectious: Win64/Expiro is a cross-platform file infector

ESET Research30 Jul 2013


Malware

Android spyware “on rise” as snooper apps multiply

Android spyware “on rise” as snooper apps multiply

Malware

Android spyware “on rise” as snooper apps multiply

Spyware is a growing threat on Android phones, according to research by Kindsight Labs, a division of Alcatel-Lucent.

Rob Waugh25 Jul 2013


How To, Malware

Is your new app what it seems? How to spot the latest Android scams

Is your new app what it seems? How to spot the latest Android scams

How To, Malware

Is your new app what it seems? How to spot the latest Android scams

Spotting “bad” apps on Android is not always easy - with cybercriminals finding new tricks every month to fool phone and tablet users into downloading malware.

Rob Waugh22 Jul 2013


Malware, Cybercrime

"Hugely significant" SIM card vulnerability leaves millions of cellphones at risk

"Hugely significant" SIM card vulnerability leaves millions of cellphones at risk

Malware, Cybercrime

"Hugely significant" SIM card vulnerability leaves millions of cellphones at risk

Millions of SIM cards in use today are vulnerable to hacking - allowing for attacks where SIM cards could be cloned remotely, or voicemail numbers could be changed, according to a German security researcher.

Rob Waugh22 Jul 2013


Malware, Cybercrime

New ransomware uses Organized Crime unit threat to scare users

New ransomware uses Organized Crime unit threat to scare users

Malware, Cybercrime

New ransomware uses Organized Crime unit threat to scare users

New “ransomware” attempts to terrify users into paying up by using the name of Britain’s SOCA crime unit - the Serious Organized Crime Agency, dealing with drugs, people smuggling, human trafficking, major gun crime, fraud and computer crime.

Rob Waugh19 Jul 2013


Malware, Cybercrime

Hacked signal-boosters let cybercriminals "listen in" on cellphones

Hacked signal-boosters let cybercriminals "listen in" on cellphones

Malware, Cybercrime

Hacked signal-boosters let cybercriminals "listen in" on cellphones

A $250 signal-boosting device for cellphone users can be hacked, two researchers claim - offering total access to phone calls, internet use and text messages on devices connected to the “femtocell”.

Rob Waugh16 Jul 2013


Malware

“Warning fatigue” means browser users ignore up to 70% of security alerts

“Warning fatigue” means browser users ignore up to 70% of security alerts

Malware

“Warning fatigue” means browser users ignore up to 70% of security alerts

Browser security warnings can work to protect users from phishing and malware sites - but “warning fatigue” means important alerts over site security can be conmpletely ignored.

Rob Waugh15 Jul 2013


Malware

“Bug bounties” are cheap way to keep companies secure, Berkeley study finds

“Bug bounties” are cheap way to keep companies secure, Berkeley study finds

Malware

“Bug bounties” are cheap way to keep companies secure, Berkeley study finds

“Bug bounties” paid out for finding and reporting bugs and vulnerabilities are a cheap and effective way for companies to bolster their security, an independent study by UC Berkeley researchers has found.

Rob Waugh10 Jul 2013