A new version of a file-infecting malware program that’s being distributed through drive-by download attacks is also capable of stealing FTP (File Transfer Protocol) credentials.

A new version of a file-infecting malware program that’s being distributed through drive-by download attacks is also capable of stealing FTP (File Transfer Protocol) credentials.
The Chinese cyber-spies behind the widely publicised espionage campaign against The New York Times have added Dropbox and WordPress to their bag of spear-phishing tricks.
The number of mobile malware apps has jumped 614 percent in the last year, according to studies conducted by McAfee and Juniper Networks.
A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
A security flaw could affect 99 percent of Android devices, a researcher claims, but the reality is that most Android users have very little to worry about.
On Tuesday, Microsoft pushed out seven new security bulletins – along with their accompanying patches – as well as a new policy that affects both third-party apps and those developed by Microsoft itself.
Security experts offer five tips for enhancing security that don’t cost a lot of cash – and sometimes no money at all – so companies can spend their security dollars on the hard stuff.
Few business sectors have been more profoundly affected than retail by the arrival of a truly interconnected digital era. Today’s …
If 3,370,780 UAE residents use Facebook, and 80 percent of those replicate their passwords for other accounts, then the opportunity for cyber theft and hackers to infiltrate personal accounts is extremely high.
A persistent, widespread malware campaign that utilises compromised Apache servers is locking users’ computers and demanding a fee of $300 to free their data.
CIOs’ ears perked up a couple of months ago when Gartner declared that in-memory computing (IMC) is racing towards mainstream adoption, and that CIOs must reskill their teams if they want to fully exploit it.
Companies and organisations should ensure that they have a full 360-degreee view of their data, says AccessData’s Paul Wright.
The pace of information creation continues to accelerate, but the ability of infrastructure and information management to keep pace is coming within sight. Big Data is now considered a blessing rather than a curse.
SAP has significantly improved the security of its products over the past few years but many of its customers are negligent with their deployments, which exposes them to potential attacks that could cripple their businesses, according to security researchers.
Oracle released a huge update for the virtually ubiquitous software, but attackers aren’t done exploiting Java as the weakest link in the security chain, and Oracle isn’t securing it fast enough.
The source code for the Carberp banking Trojan program is being offered for sale on the underground market at a very affordable price.
Oracle plans to make changes to strengthen the security of Java, including fixing its certificate revocation checking feature, preventing unsigned …
DDoS attackers attempted to bring down an unnamed financial services firm earlier this week using one of the largest traffic …
Google threw the gauntlet down before the software industry to clean up its mistakes faster than has been done in …
You probably should upgrade before next April. After that month, Microsoft will no longer provide security updates for Office 2003 …