Analyst firm A-V Comparative has released its November 2013 list of the antimalware programmes that do the best job of removing malware from an already infected system.
When it comes to security, it seems everyone’s in a state of perpetual panic. Whether it’s mobile malware, BYOD or hacktivism, over the course of 2013 the issue of protecting valuable information and resisting attack has inspired a dizzying and persistent challenge.
Researchers have demonstrated that microphones and speakers built into laptops can be used to covertly transmit and receive data through inaudible audio signals.
Two million logins and passwords from services such as Facebook, Google and Twitter have been found on a Netherlands-based server, part of a large botnet using controller software nicknamed “Pony.”
Balancing security priorities with business flexibility and agility is a tough challenge, says Anthony Perridge, EMEA Channel Director, Sourcefire.
Attackers are exploiting a new and unpatched vulnerability in Windows XP and Windows Server 2003 that allows them to execute code with higher privileges than they have access to.
A new Trojan programme that targets users of online financial services has the potential to spread very quickly over the next few months, security researchers warn.
Because data is often the most valuable corporate asset – especially when customer information is concerned – staying alert for potential compromise is a critical IT job. Unfortunately, looking into a potential data breach is not easy.
A new malicious software programme, advertised for sale on underground forums, claims to mine and steal bitcoins, according to a Danish security company. The Atrax malware is notable for its low US$250 price …
Cybercriminals are increasingly using the “Blackshades” malware program whose source code was leaked three years ago, according to an analysis by Symantec.
The U.S. National Security Agency reportedly hacked into over 50,000 computer networks around the world as part of its global intelligence gathering efforts, and also taps into large fiber optic cables that transport Internet traffic between continents at 20 different major points.
Through the advent of mobility, smartphones and tablets are now more dangerous devices to enterprises than laptops and PCs.
Mobile malware continues to proliferate, and at the same time employees are insisting on bringing their personal devices to work.
Microsoft is opening a landmark 16,800-square foot (1,560m sq) Cybercrime Centre on its Redmond campus to act as an HQ and anchor point for a network of satellite offices that will collect evidence on malware from every continent, the firm has announced.
The creators of a Web-based attack tool called Angler Exploit Kit have added an exploit for a known vulnerability in Microsoft’s Silverlight browser plug-in to the tool’s arsenal. Exploit kits are essentially malicious …
IBM yesterday announced an agreement to acquire Fiberlink Communications, saying the purchase is a key part of a broader mobile-security strategy to provide assurance in transactions conducted via devices such as iPhones and Android smartphones.
The website of a U.S. organization specializing in national and international security policy was compromised with malware that targeted a previously unknown vulnerability in Internet Explorer.
Malicious software aimed at stealing online banking credentials surged in the third quarter of this year to a level not seen since 2002, according to a new report from Trend Micro.
Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in domestic and international security policy.
With some commentators labeling the BYOD trend as unstoppable, organisations are now turning to MDM to ensure the security of their networks. But how should MDM be tackled?
CNME is this week set to host its BYOD Summit 2013, the Middle East’s first technology to conference dedicated entirely to the bring-your-own-device trend.
The FBI has offered large rewards for information that could help them catch a clutch of alleged cyber-criminals.
Microsoft might stop updating Microsoft Security Essentials (MSE) antivirus software on systems running Windows XP after next April’s support cut-off, the company has suggested.
Spear phishing is one of the most effective ways to break into a corporate network – and recent studies show that employees can be easily tricked on social media to provide the information needed to launch attacks.
Microsoft today said that attackers are exploiting a critical and unpatched vulnerability in Office 2007 using malformed documents to hijack Windows PCs, and that Office 2003 and Office 2010 are also vulnerable.
We just found 30 servers that can’t be accounted for. Thirty Internet-facing servers with no malware protection and patchy histories. I need to take a deep breath and figure out just how bad this is and what we can do to stop this sort of thing from happening again.
Kaspersky Lab has revealed research results that show an increase in malware in the Middle East.
Windows 8′s user share in October climbed past the 10% milestone for the first time since the launch of the radically-overhauled OS a year ago, an analytics company said Friday. The operating system’s …
A British man has been charged with hacking into US government computers and stealing personal data about thousands of employees, then bragging about it on Twitter.
A malicious software program found in ATMs in Mexico has been improved and translated into English, which suggests it may be used elsewhere, according to security vendor Symantec.
There’s a big threat wiling around on the Internet right now: a particularly nasty piece of ransomware called Cryptolocker.
The biggest cyber-threats facing Middle Eastern businesses today come in the form of targeted attacks, Trend Micro’s Vice President for the Mediterranean, Middle East and Africa regions said today.
Trend Micro will release its findings on the greatest IT security threats to business in the MENA region at GITEX 2013, the company said Sunday.
Network Solutions is investigating an attack by a pro-Palestinian hacking group that redirected websites belonging to several companies.
Alex Holden, founder of security company Hold Security, is in the business of bringing companies bad news.
Google has removed an application from its Play store that purported to be AdBlock Plus, a well-known application that blocks online ads.
The cyber-criminals behind ZeroAccess, one of the largest botnets in existence, have lost access to more than a quarter of the infected machines they controlled.
The Federal Circuit Court of Australia has awarded Microsoft $304,994.95 in damages after Paul McLane, trading as Software Paul, was caught selling counterfeit Microsoft software. This is not the first time McLane has …
According to new poll conducted on MacWorld, 64% of readers think that iOS 7 is great. However, there are some people who are not so keen.
A group of between 50 and 100 professional hackers operating out of China has been systematically targeting businesses, military and government agencies around the world since at least 2009, security vendor Symantec said in a report released on Tuesday.
One of the world’s leading online security and privacy experts has warned that unprotected remote working and social media use can pose significant risks to both individuals and businesses across the Middle East.
Much of what Apple offers enterprise workers and their IT departments in the new iPhone 5S and 5C comes by virtue of its new iOS 7, first announced in June.
The US is engaged in a wide-ranging campaign of cyber-operations against foreign targets, launching over 200 in 2011 alone, budget documents leaked by Edward Snowden to the Washington Post have confirmed. The US is …
Mobile and tablet devices have become real hubs for all sorts of personal information, photos, work files, music, videos and so much more. It’s just impossible to know just how much your device …
In a much-publicized recent case, scientists at Georgia Tech managed to get a specially crafted app that could perform all sorts of malicious activities app-aptly named Jekyll-onto the App Store
Smartphones are a treasure trove of personal information and it doesn’t take much for people who would mean you harm to get at all that sensitive data.
If you’re in the market for a high-performing, low-priced Ultrabook, this has to be the one to go for.
Have you noticed that tablets are starting to feel a little mundane? You’ve got a rectangular slate with a large display while the manufacturer’s bragging about how it’s some fragment of a millimeter thinner or some fraction of an ounce lighter than the last.
The Note 8.0 is decent small tablet that costs just a little bit too much.