Further evidence has emerged that the Syrian Government is targeting opposition activists using a well-known remote access Trojan distributed through bogus Skype calls. View full post on Techworld.com security View full post on National Cyber Security » Computer Hacking
Malware uses Office flaw to target Mac OS X
Microsoft has warned of new malware that exploits an old flaw in Office to attack Mac OS X machines ( ZDNet UK – Security Threats ) View full post on malware – Yahoo! News Search Results View full post on National Cyber Security » Virus/Malware/Worms
Update of Android malware uses exploit to take over
LeNa displays what looks like the official Android marketplace once it is on the device. (Credit: Lookout) A new variant of a piece of Android malware dubbed LeNa (Legacy Native) has been modified so that it does not require user interaction to take control of a device, mobile security firm…
Tibet.A malware for OS X uses Flashback Java vulnerabilities
One recent malware program for OS X that has caused concern has been the Flashback Trojan, which in its latest variants has taken advantage of Java security holes to embed code in programs or user accounts that will launch the malware when Web browsers are used. Once run, the malware…
Rutgers-Camden professor uses computer modeling to more accurately analyze DNA evidence
CAMDEN — Move over, David Caruso. Rutgers–Camden has a computer scientist on the case. View full post on computer forensic – Yahoo! News Search Results View full post on National Cyber Security
Email Antivirus Software uses 2 modes of detection.
Dual Approach Solution Combines Zero-Hour Cloud-Based Detection with High-Performance Antivirus SAN FRANCISCO — RSA Conference — Commtouch® (NASDAQ: CTCH) today announced the availability of its enhanced Antivirus for Email solution which uses a unique dual-detection approach to ensure malware identification from the zero-hour of an outbreak through any stage of…
Malware increasingly uses DNS to avoid detection, experts say
IDG News Service – The number of malware threats that receive instructions from attackers through DNS is expected to increase, and most companies are not currently scanning for such activity on their networks, security experts said at the RSA Conference 2012 on Tuesday. There are many channels that attackers use…
Malware Increasingly Uses DNS as Command and Control Channel to Avoid Detection, Experts Say
The number of malware threats that receive instructions from attackers through DNS is expected to increase, and most companies are not currently scanning for such activity on their networks, security experts said at the RSA Conference 2012 on Tuesday. There are many channels that attackers use for communicating with their…
Android malware uses server-side polymorphism to evade detection
Adrian Kingsley-Hughes is an internationally published technology author who has devoted over a decade to helping users get the most from technology — whether that be by learning to program, building a PC from a pile of parts, or helping them get the most from their new MP3 player or…
Koobface Gang Uses Facebook to Spread Powerful Worm
The men live comfortable lives in St. Petersburg — and have frolicked on luxury vacations in places like Monte Carlo, Bali and, earlier this month, Turkey, according to photographs posted on social network sites — even though their identities have been known for years to Facebook, computer security investigators and…