Techworld

Stories by Lucian Constantin

Hackers make drive-by download attacks stealthier with fileless infections

Cybercriminals are increasingly infecting computers with malware that resides only in memory in order to make their attacks harder to detect.

By Lucian Constantin | 03 September, 2014 04:17

Tags: security, Desktop security, spyware, bitdefender, malware

Reconnaissance code on industrial software site points to watering hole attack

Attackers deploy Web-based reconnaissance tool to gather information about potential targets in different industries

By Lucian Constantin | 02 September, 2014 02:39

Tags: security, AlienVault, Desktop security, spyware, malware

CryptoWall held over half-a-million computers hostage, encrypted 5 billion files

A file-encrypting ransomware program called CryptoWall infected over 600,000 computer systems in the past six months and held 5 billion files hostage, earning its creators more than US$1 million, researchers found.

By Lucian Constantin | 29 August, 2014 22:24

Tags: Dell SecureWorks, security, encryption, data protection, malware

Mozilla reports user data leak from Bugzilla project

Email addresses and encrypted passwords of around 97,000 users who tested early builds of the Bugzilla bug tracking software were left exposed for three months following a server migration.

By Lucian Constantin | 28 August, 2014 22:38

Tags: security, data breach, Mozilla Foundation, data protection, privacy

Vulnerabilities on the decline, but risk assessment is often flawed, study says says

Based on data gathered over the first six months of 2014, security researchers from IBM X-Force predict that the number of publicly reported vulnerabilities will drop to under 8,000 this year, a first since 2011.

By Lucian Constantin | 28 August, 2014 05:03

Tags: patches, Forum for Incident Response and Security Teams, Open Security Foundation, security, IBM, Risk Based Security, patch management, Exploits / vulnerabilities

New malvertising campaign hit visitors of several high-profile sites

Some visitors to several high-profile websites last week were redirected to browser exploits that installed malware on their computers because of malicious advertisements on those sites.

By Lucian Constantin | 28 August, 2014 03:22

Tags: online safety, Fox-IT, DeviantART, security, Desktop security, Photobucket, AppNexus, Oracle, malware

Hackers prey on Russian patriotism to grow the Kelihos botnet

The cybercriminal gang behind the Kelihos botnet is tricking users into installing malware on their computers by appealing to pro-Russian sentiments stoked by recent international sanctions against the country.

By Lucian Constantin | 27 August, 2014 01:47

Tags: security, scams, spyware, websense, bitdefender, malware

Firefox OS to outdo Android on granular application permissions

Future versions of the Firefox OS mobile platform will allow users to control application-specific permissions, a feature with both privacy and security benefits that's missing on Android.

By Lucian Constantin | 27 August, 2014 00:01

Tags: Google, security, Access control and authentication, mobile security, Mozilla Foundation, Electronic Frontier Foundation, privacy

Attack targets firms from the automobile industry in Europe

Cybercriminals are using a new information-stealing malware program to target companies from the automobile industry in Europe, security researchers warned.

By Lucian Constantin | 25 August, 2014 21:35

Tags: symantec, security, Desktop security, spyware, malware

Startup builds intrusion prevention system for home networks

At a time of growing concern about the security of interconnected devices in homes, a startup aims to provide consumers with a type of network security system traditionally used by businesses.

By Lucian Constantin | 18 August, 2014 02:42

Tags: Detection / prevention, networking hardware, intrusion, security, Networking, routers, Itus Networks

New Gameover Zeus botnet keeps growing, especially in the US

Cybercriminals are in the process of rebuilding the Gameover Zeus (GOZ) botnet, which law enforcement authorities took over in June, and recent research suggests that they've had some success, especially in the U.S.

By Lucian Constantin | 15 August, 2014 02:21

Tags: arbor networks, online safety, security, Malcovery Security, Desktop security, bitdefender, malware

BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software

BlackBerry's focus on strong security as a key differentiator for its devices does not mean that they're completely free of flaws. The company released security updates Tuesday for both the OS running on its smartphones and for its enterprise server software.

By Lucian Constantin | 14 August, 2014 03:14

Tags: Blackberry, patches, BlackBerry OS, security, Mobile OSes, mobile security, Exploits / vulnerabilities, mobile

Users should patch critical flaw in Adobe Reader and Acrobat, researchers say

Adobe Systems has released security patches for its Flash Player, Reader and Acrobat products, addressing a total of eight vulnerabilities, including one that is being exploited by attackers.

By Lucian Constantin | 13 August, 2014 23:20

Tags: patches, online safety, Adobe Systems, security, patch management, Exploits / vulnerabilities

Fifteen new vulnerabilities reported during router hacking contest

Routers appear to be as insecure as ever, after hackers successfully compromised five popular wireless models during a contest at the DefCon 22 security conference, reporting 15 new vulnerabilities to affected vendors.

By Lucian Constantin | 13 August, 2014 04:10

Tags: Tp-link Technologies, Actiontec Electronics, Linksys, online safety, TRENDnet, Networking, routers, belkin, Asustek Computer, Exploits / vulnerabilities, Electronic Frontier Foundation, networking hardware, security, netgear, D-Link, Verizon Communications, Independent Security Evaluators

Many home routers supplied by ISPs can be compromised en masse, researchers say

Specialized servers used by many ISPs to manage routers and other gateway devices provisioned to their customers are accessible from the Internet and can easily be taken over by attackers, researchers warn.

By Lucian Constantin | 10 August, 2014 23:33

Tags: networking hardware, Check Point Software Technologies, intrusion, online safety, security, Networking, routers, Exploits / vulnerabilities

Top Whitepapers

Twitter Feed

Featured Whitepapers