spyware - News, Features, and Slideshows
A group of attackers with links to the Chinese hacking underground has been targeting companies from the entertainment and video game industries for years with the goal of stealing source code.
By Lucian Constantin | 31 July, 2014 22:18
The Electronic Frontier Foundation, a digital privacy rights group, has released a downloadable plugin for Chrome and Firefox designed to stop third parties from tracking people's Web browsing.
By Zach Miners | 22 July, 2014 05:19
A new Trojan program designed to steal log-in credentials and other financial information from online banking websites is being advertised to cybercriminal groups on the underground market.
By Lucian Constantin | 15 July, 2014 04:33
Police from eight countries together with several private security companies disrupted the online infrastructure used by cybercriminals to control computers infected with a malware program called Shylock.
By Lucian Constantin | 11 July, 2014 04:00
There is yet another reason to be wary of spam email about bank transfers or invoices -- it could be carrying a new, cleverly designed malware program that steals financial information.
By Lucian Constantin | 01 July, 2014 02:29
Whitepapers about spyware
In 2010, the threat posed by the web is sharper and more extensive than ever before. Almost any website can now host malware, or forward you to one that does. Indeed, an infection is much more likely to result from a visit to a perfectly legitimate website that has been compromised with a virus or spyware – than from one set up specifically to spread malware. Read More.
A DDoS attack can be a stressful engagement where parts of the network will be unresponsive and equipment may be failing all around. That is not the time to be planning a defense—preparing your network applications during “peacetime” will go a long way to helping you mitigate the attack in the future.
- Tor hints at possible U.S. government involvement in recent attack
- 25G driving Ethernet switch market to $25B
- Great privacy essay: Fourth Amendment Doctrine in the Era of Total Surveillance
- IBM buys access control and identity management firm CrossIdeas
- Congress okays upgrade of VA's 29-year-old software
- Hacker group targets video game companies to steal source code
- AMD's Kaveri processors coming to smaller, cheaper desktops
- EC stepping up antitrust inquiry into Google, Android
- Xbox One's high price in China draws complaints, but likely buyers too
- Vision-correcting display nixes your need for eyeglasses
- In a hyper-social world, some seek a little privacy
- Facebook app gives free Internet to mobile users in Zambia
- Sony profit leaps on PlayStation 4 strength
- China's Xiaomi rises to fifth place in smartphone rankings
- Electoral commission cautions against rush to e-voting