Don’t Believe Everything You Read

Lies, damned lies, and statistics – it’s a phrase that has been attributed to Mark Twain and former British Prime Minister Benjamin Disraeli, among others. Whoever it was that said it first, he could have been talking about vulnerability statistics. This is the view of two researches who presented their case this week at the Black...

Read more

Android Master Key Malware Surfaces in China

The first known malware to exploit the Android master key vulnerability described by BlueBox Security has been found in an application market based in China, a McAfee researcher reported this week. Mobile malware researcher Daisuke Nakajima said the app used the vulnerability to hide the malicious classes.dex from Android’s package...

Read more

Stock Exchanges Fear Cyber Threat is Growing

Researchers working in the securities sector have warned that stock exchanges around the world have become the targets of cyber-criminals and that the potential exists for attacks that would close down financial markets. The warning was made in a report issued this month (July 2013) by the International Organization of Securities Commissions...

Read more

I Spy With My Little Eye…A Scam!

If someone offered you the opportunity to secretly read your friends’ instant messages without being detected, would you want to do that? You could spy on your significant other, or your friends and coworkers—and no one would be the wiser. All you have to do is go to a discreet website and provide your cell phone number so you can...

Read more

What To Do When Ransomware Holds a PC Hostage

In my previous post, I talked about ransomware locking a user out from his PC. This article is geared toward the IT professional who may be called upon to attempt to unlock the PC and clean up the mess the malware leaves behind. For the advice below, I consulted with John Harrison, Group Manager at Symantec Security Response. His team is in the...

Read more

More Posts