The view from the top of IT with TechWorld Editor Rohan Pearce
Two million logins and passwords from services such as Facebook, Google and Twitter have been found on a Netherlands-based server, part of a large botnet using controller software nicknamed "Pony."
By Jeremy Kirk | 04 December, 2013 04:40
In a development likely to concern those who believe that a system that's not connected to a network is safe from surveillance, researchers have demonstrated that microphones and speakers built into laptops can be used to covertly transmit and receive data through inaudible audio signals
By Lucian Constantin | 03 December, 2013 17:25
Attackers are exploiting a new and unpatched vulnerability in Windows XP and Windows Server 2003 that allows them to execute code with higher privileges than they have access to.
By Lucian Constantin | 28 November, 2013 17:08
A new Trojan program that targets users of online financial services has the potential to spread very quickly over the next few months, security researchers warn.
By Lucian Constantin | 26 November, 2013 16:45
You wouldn't let your kids walk the streets of Amsterdam's Red Light District, but giving them unrestricted access to the Web is practically the same thing. The problem is, how do you block out all that inappropriate Web content?
By Rick Broida | 28 July, 2010 07:48
Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users
By Roger A. Grimes | 30 September, 2013 10:05
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
By Tony Bradley | 09 March, 2011 06:06
Perhaps you've heard that the Apple Mac OS X operating system is simply more secure by design and not prone to the security flaws and vulnerabilities that plague the dominant Microsoft Windows operating system? Well, don't believe the hype. Apple unleashed an update for Mac OS X this week which fixes a massive 134 vulnerabilities.
By Tony Bradley | 12 November, 2010 02:15
Threat Emulation uses a sandbox as a separate, isolated environment in which files are open and run to determine whether they are safe or malicious. In this infographic, we look at its implementation and the technology required to avoid infecting a corporate network.