Trusted insider a security threat, warns Brandis
Security planners are racing to close gaps across networks and ICT infrastructure. But they have overlooked a Trojan horse already inside the gate, Attorney-General, George Brandis has warned.
Security planners are racing to close gaps across networks and ICT infrastructure. But they have overlooked a Trojan horse already inside the gate, Attorney-General, George Brandis has warned.
The earliest worms and viruses were created for geeky fun and did little harm - oh, how times have changed. Here are 20 worms, viruses and botnets that show the evolution of malware, from Creeper to Flame.
As with your computer, the best defense against malware is a good offense in the form of security software. Paid mobile security apps are much better at detecting malware in Android devices than free antivirus applications, according to a study by AV Test today. If your business relies at all on smartphones, make sure that you and your employees are protected with the right mobile security package.
Today is Microsoft’s Patch Tuesday for the month of November--the eleventh Patch Tuesday of 2011. It is a light month from Microsoft, with only four security bulletins. The big news, though, is that a zero day flaw being exploited by the Duqu worm is not among the vulnerabilities fixed by Microsoft today.
Today is Patch Tuesday again. The ninth of the year already. Microsoft has released five new security bulletins, and Adobe has joined the party with some security patching of its own today. With all of the vulnerabilities and updates, though, you need to take a step back to prioritize and figure out which patches are most urgent.
Career criminal Willie Sutton was often quoted saying that he robbed banks "because that's where the money is." The legend sounds good, but Sutton actually said in his biography, "Go where the money is...and go there often."
An explosion in mobile malware in the first half of 2011 has exponentially increased the chance of an Android device getting infected according to one study. Unfortunately for Android users, another study shows that they are the least aware of security concerns and least prepared to protect their smartphone or tablet from malware.
According to some headlines, the sky is falling on Android. No, I am not referring to the headlines predicting that the iPhone 5 will double Apple's smartphone market share and leave Android in its dust. I am referring to reports that a new Trojan has infiltrated the Android ecosystem. Some experts, however, suggest this may not be malware, but simply an app working as intended.
Mac users and those who offer administration and support to them find themselves in the security rat race for the first time, as MacDefender scareware has rapidly adapted to avoid Apple's detection.
It has been the busiest quarter on record for malware according to a new report from McAfee. The McAfee Threats Report: First Quarter 2011 claims six million unique malware samples were recorded during the first quarter of 2011, and also points out that spam traffic is down, and mobile malware threats are on the rise.
Speaking at the All Things Digital D9 conference, Google Executive Chairman Eric Schmidt said in a wide-ranging Q&A session that the best workstation security is offered by a Mac, coupled with Google's Chrome browser. Additionally, he suggests users of Google's services should activate two-step authentication -- introduced earlier this year -- which requires users to enter a code that's texted to their phone each time they log in on a new computer.
There is a new world order. MacDefender, and subsequently MacGuard, demonstrate that the inherent security by obscurity of the Mac is fading, and that attackers are looking at the bigger picture.
Apple may have conquered the Mac Defender malware with an official support page and a promise to wipe out the problem through a software update, but that's not stopping malware authors from fighting back.
Hotmail accounts were recently targeted by an attacking against a zero-day vulnerability in the Microsoft Webmail system. The attack is more insidious than some because it executes without user intervention when a malicious email is opened.
There are phishing scams out there targeting Adobe users. Make sure you know how to recognize and avoid these threats when they arrive in your Inbox.