spyware - News, Features, and Slideshows
As security researchers continue to analyze malware used by a sophisticated espionage group dubbed the Equation, more clues surface that point to the U.S. National Security Agency being behind it.
By Lucian Constantin | 12 March, 2015 06:40
If you patched your Windows computers in 2010 against the LNK exploit used by Stuxnet and thought you were safe, researchers from Hewlett-Packard have some bad news for you: Microsoft's fix was flawed.
By Lucian Constantin | 12 March, 2015 01:33
A collection of computer Trojans that have been used since 2009 to steal data from government agencies, military contractors, media organizations and other companies is tied to cyberespionage malware possibly created by French intelligence agencies.
By Lucian Constantin | 10 March, 2015 02:25
European law enforcement agencies seized command-and-control servers used by Ramnit, a malware program that steals online banking credentials, FTP passwords, session cookies and personal files from victims.
By Lucian Constantin | 26 February, 2015 06:07
The Stuxnet computer worm that was used to sabotage the Iranian nuclear program was likely preceded by another sophisticated malware program that used some of the same exploits and spread through USB thumb drives to computers isolated from the Internet.
By Lucian Constantin | 18 February, 2015 02:03
Whitepapers about spyware
In 2010, the threat posed by the web is sharper and more extensive than ever before. Almost any website can now host malware, or forward you to one that does. Indeed, an infection is much more likely to result from a visit to a perfectly legitimate website that has been compromised with a virus or spyware – than from one set up specifically to spread malware. Read More.
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
- FT.Net Solution ArchitectNSW
- CCMobile Designer / Developer - IOSNSW
- FTJunior Media Buyer - Sales CoordinatorNSW
- CCFront End Web Developer (Drupal)NSW
- CCMobile iOS DeveloperNSW
- FTSenior SQL DBANSW
- CCSenior Systems EngineerNSW
- FTBusiness Management - Account Director - Leading Entertainment ClientNSW
- CCMobile Designer / Developer - IOSNSW
- CCDBA (Oracle/SQL)NSW
- CC.Net Solution ArchitectNSW
- FTApplication Support SpecialistNSW
- CCSenior Release EngineerNSW
For the foreseeable future, a two-tier DDoS protection architecture should continue to provide the flexibility and manageability that today’s architects need to combat the modern DDoS threat. This recommended DDoS protection reference architecture leverages F5’s long experience combatting DDoS attacks with its customers. •Learn the four categories of DDoS threats and the recommended mitigation architectures •Answer why you should consider a cloud based scrubbing service and how to choose one •Understand the benefits to a multi-tier DDoS protection architecture
- Vodafone cuts complaints
- GitHub recovering from massive DDoS attacks
- In Pictures: How 20 (mostly) tech companies' logos have evolved over the years
- In Pictures: Worst data breaches of 2014
- In Pictures: 9 security gadgets for mobile devices
- 'Largest DDoS attack' in GitHub's history targets anticensorship projects
- FCC will vote next month on plan to share valuable 3.5GHz spectrum
- Intel could strengthen its server product stack with Altera
- Kleiner Perkins cleared of sex discrimination against Ellen Pao
- Facebook reveals the logic behind its forced Messenger split
- French self-driving car goes for a spin around Paris monument
- Google to bring imaging, sensor technology to the operating room
- 5 freshly-funded cloud computing companies worth watching
- Why Meerkat and Periscope are the next big challenge for marketers
- USB Type-C peripherals are on the way, and storage devices are first up