Internet of Things


492 articles

Malware, Cybercrime

Watering hole attack on Dept. of Labor site "exploited new IE8 vulnerability"

Watering hole attack on Dept. of Labor site "exploited new IE8 vulnerability"

Malware, Cybercrime

Watering hole attack on Dept. of Labor site "exploited new IE8 vulnerability"

A "watering hole" attack on pages within the U.S. Department of Labor site exploited a "zero-day" vulnerability in Internet Explorer 8 to deliver malware to visitors, according to reports.

Rob Waugh07 May 2013


Malware, Cybercrime

China is behind "numerous" attacks on U.S. computer systems, says Pentagon

China is behind "numerous" attacks on U.S. computer systems, says Pentagon

Malware, Cybercrime

China is behind "numerous" attacks on U.S. computer systems, says Pentagon

The Chinese government and military are behind large numbers of cyberespionage attacks directed at U.S. government computer systems, according to a Pentagon report released this week.

Rob Waugh07 May 2013


Malware

Linux Apache malware: Why it matters to you and your business

Linux Apache malware: Why it matters to you and your business

Malware

Linux Apache malware: Why it matters to you and your business

This comprehensive look at the problems of malware on Linux Apache web servers explains the threats to business and helps you figure out if your organization is likely to be affected.

Stephen Cobb06 May 2013


Malware, Scams

Parents need to teach pre-school children to use the internet safely

Parents need to teach pre-school children to use the internet safely

Malware, Scams

Parents need to teach pre-school children to use the internet safely

Pre-school children should learn to get to grips with technology and its problems, argues David Harley, ESET Senior Research Fellow.

Rob Waugh03 May 2013


Malware

The stealthiness of Linux/Cdorked: a clarification

The stealthiness of Linux/Cdorked: a clarification

Malware

The stealthiness of Linux/Cdorked: a clarification

We clarify that the Linux/Cdorked backdoor malware leaves no traces on the hard drive "other than its modified httpd binary" which can be scanned for detection in several ways.

Stephen Cobb02 May 2013


Malware

PC game service admits to serving up Bitcoin-mining malware

PC game service admits to serving up Bitcoin-mining malware

Malware

PC game service admits to serving up Bitcoin-mining malware

Users of popular PC gaming service ESEA have discovered that their PCs have been hijacked to mine Bitcoins by malware served up alongside the company’s client. A hidden Bitcoin-mining process caused users' graphics cards to overheat as it worked in the background.

Rob Waugh01 May 2013


Malware, Cybercrime

Password warning after details for 50 million users leak in LivingSocial hack

Password warning after details for 50 million users leak in LivingSocial hack

Malware, Cybercrime

Password warning after details for 50 million users leak in LivingSocial hack

Daily deals site LivingSocial has become the latest high-profile site to fall victim to hackers, after an attack accessed information for 50 million accounts last week.

Rob Waugh28 Apr 2013


Malware, Cybercrime

Twitter security under spotlight after phishing blamed for disastrous AP Tweet

Twitter security under spotlight after phishing blamed for disastrous AP Tweet

Malware, Cybercrime

Twitter security under spotlight after phishing blamed for disastrous AP Tweet

Twitter is said to be testing new security systems in the wake of a false Tweet from an official Associated Press account which sent stock markets tumbling in America.

Rob Waugh24 Apr 2013


Malware, Scams, Cybercrime

Preventable errors are behind most security breaches, says Verizon report

Preventable errors are behind most security breaches, says Verizon report

Malware, Scams, Cybercrime

Preventable errors are behind most security breaches, says Verizon report

Most cyber attacks are simple and predictable, relying on basic tactics and preventable employee errors, according to Verizon’s annual Data Breach Investigations Report. The problem is made worse by the fact that companies often take months or even years to detect such breaches.

Rob Waugh23 Apr 2013