spyware - News, Features, and Slideshows
A cyberespionage group has been using advanced spear-phishing techniques to steal email log-in credentials from the employees of military agencies, embassies, defense contractors and international media outlets that use Office 365's Outlook Web App.
By Lucian Constantin | 24 October, 2014 21:03
Isolating computers from the Internet, called "air gapping," is considered one of the best ways to defend critical systems and their sensitive data from cyberattacks, but researchers have found that can be undermined using an all-in-one printer.
By Lucian Constantin | 17 October, 2014 03:03
A cyberespionage group operating out of Russia has launched malware attacks against the Ukrainian government and at least one U.S.-based organization through a previously unknown vulnerability that affects most versions of Windows.
By Lucian Constantin | 14 October, 2014 22:39
The CEO of a Pakistani company has been indicted in the U.S. for selling a product called StealthGenie that buyers could use to monitor calls, texts, videos and other communications on other people's mobile phones, the U.S. Department of Justice said.
By Grant Gross | 30 September, 2014 05:31
Whitepapers about spyware
In 2010, the threat posed by the web is sharper and more extensive than ever before. Almost any website can now host malware, or forward you to one that does. Indeed, an infection is much more likely to result from a visit to a perfectly legitimate website that has been compromised with a virus or spyware – than from one set up specifically to spread malware. Read More.
Benefits based on Forrester Consulting Study “The Total Economic Impact of Converging SAP Landscapes on Vblock™ Systems”
Many organisations believe they can transform their IT operations by simply buying a new management tool. However, this is just the start. This whitepaper discusses the dynamics of a complete transformation: • Learn why IT management tools should be more than "plug & play" • The 5-step plan to implementing ITSM for the best results long-term • Understand why your approach should be more about the data and less about the tool itself
- Microsoft's Surface turns first profit in 2 years
- Why Google wants to replace Gmail
- Wi-Fi Passpoint standard now knits together SF, San Jose, London
- Big Data Digest: Rise of the think-bots
- FCC pushes TV spectrum auction to 2016 after legal challenge
- Apple mum as Mac owners tussle with Yosemite over Wi-Fi problems
- Wireless price war's good for consumers, but challenges carriers
- Apple Pay tops Tim Cook's to-do list in China
- The ratings: Most net neutrality groups get poor grades for funding transparency
- Advocacy groups accused of obscuring corporate ties in net neutrality debate
- Secretive funding fuels ongoing net neutrality astroturfing controversy
- OS X Yosemite uptake climbs to 13% in first week
- Researcher works to make 3D-printed metals stronger, customizable
- Court shuts down alleged PC tech support scam
- New material could lead to longer-lasting batteries