We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

More Security Articles

  • Opinion: Attackers Get Sneakier With Encrypted Malware

    Malware just got sneaky! Well, sneakier, that is. Attackers in Brazil have found a way to sneak around antivirus programs by using cryptography.

  • News: Mac OS X sandboxing flaw reported

    Security firm CoreLabs Research claims to have found a flaw in the sandboxing functionality of Mac OS X.

  • News: F-Secure finds malware signed with stolen digital certificate

    Researchers from security vendor F-Secure have spotted a rare malicious software sample that carried a valid code-signing certificate from a Malaysian governmental institution.

  • Opinion: Five Tips to Avoid Malware in Mobile Apps

    Smartphones and tablets are evolving from niche luxury devices to mainstream consumer gadgets. As mobile devices become a ubiquitous part of the mainstream culture, malware developers are paying attention and are anxious to exploit the fertile new territory.

  • News: IBM targets managed security service at iOS, Android, Windows, BlackBerry smartphones

    IBM is offering a cloud-based managed service for mobile devices that will let IT managers exert management and security controls over devices based on Apple iOS, Google Android, the RIM BlackBerry, Symbian and Microsoft Windows Mobile.

  • Opinion: Spam Researchers Help Bust Global Cybercrime Ring

    When law enforcement authorities took down this week an international ring of Internet grifters who allegedly scammed more than $14 million from their victims, a key element of their crackdown was a spam database maintained by the University of Alabama-Birmingham.

  • News: Researchers bypass the restrictions of Mac OS X default sandbox profiles

    The restrictions imposed by Mac OS X generic application sandbox profiles can be easily bypassed, researchers from Core Security Technologies found.

  • News: Energy giant EDF used Trojans to spy on Greenpeace

    The head of nuclear security at French energy giant EDF has been given a prison sentence and his company fined a stinging 1.5 million euros (£1.3 million) after being found guilty of spying on environmental campaigners Greenpeace using Trojan malware.

  • News: Fast Five: This week in IT 11/11/11

    Your five-minute wrap of the top Australian ICT stories this week.

  • News: Hackers may have spent years crafting Duqu

    The hacker group behind Duqu may have been working on its attack code for more than four years, new analysis of the Trojan revealed Friday.

  • News: Security roundup for week ending Nov. 11

    Is there justice in cyberspace? The U.S. Department of Justice (DOJ) last week offered hope there is, charging seven individuals with 27 counts of wire fraud and other computer-related crimes in connection with a massive "clickfraud" scheme that was based in Estonia.

  • Opinion: Privacy: Will Facebook Ever Get It?

    With Facebook reportedly close to cutting a deal with the U.S. Federal Trade Commission (FTC) over privacy sins dating back to 2009, the question remains whether or not the social network's brain trust really gets the privacy issue.

  • News: Who's hacking your refrigerator?

    Now that everything's networked and process control systems are easy to hack, here's a quick-reference guide to figuring out who's behind each type of security incident.

  • News: CI pinpoints 200 millionth piece of cloud-based malware

    The good news is that Collective Intelligence (CI), the engine for Internet security created in 2006 by Panda Security's malware research laboratory, recently processed its 200 millionth malware file via the cloud. That's also the bad news.

  • News: Duqu authors sprinkle humor in dangerous code

    For all of the concern around Duqu, the most discussed piece of malicious software since Stuxnet, the latest analysis of its code shows its writers have a sense of humor.

  • News: Apple issues MacBook Pro, AirPort firmware updates

    Hope you're in a firmware-updating mood, because Apple's released updates for both the MacBook Pro as well as the AirPort Base Station and Time Capsule.

  • News: Germany prepares to sue Facebook over facial recognition feature

    The Hamburg Data Protection Authority (DPA) is starting preliminary procedures to bring legal action against Facebook over the facial recognition feature used for photo tagging on the social network. The authority decided that further negotiation is futile after the social networking giant didn't agree to obtain consent from users retroactively.

  • News: FBI disrupts search hijack gang after $14 million fraud

    The FBI has closed the net on an Estonian gang accused of being behind an extraordinary four-year multinational malware campaign said to have netted $14 million (£8.8 million) in proceeds after infecting hundreds of thousands of PCs and Macs.

  • News: Cycling star Landis sentenced for alleged Trojan attack

    Former US cycling star Floyd Landis has been handed a suspended 12-month prison sentence by a French court for his part in an alleged plot to steal documents from the country’s national anti-doping laboratory (LNDD) using Trojan malware.

  • How-Tos: How To Lock Down Your Wireless Network

    If you operate a wireless network for your home or business, it's important to ward it against opportunistic hackers seeking to steal your data or hijack your Wi-Fi for their own nefarious purposes. We spoke to Steven Andrés, CTO of security consulting firm Special Ops Security, to learn about the best ways to lock down your Wi-Fi. To get started, you'll need to log in to your router's administrative console by typing the router's IP address into your Web browser's address bar. Most routers use a common address like 192.168.1.1, though alternatives like 192.168.0.1 and 192.168.2.1 are also common. Check the manual that came with your router to determine the correct IP address; if you've lost your manual, you can usually find the appropriate IP address on the manufacturer's website.



IDG UK Sites

OnePlus Two release date rumours: Something's happening on 22 July

IDG UK Sites

13in MacBook Air review, Apple's MacBook Air 2014 reviewed

IDG UK Sites

5 reasons to buy an electric car and 5 reasons not to

IDG UK Sites

Evernote Skitch: the best way for creatives to doodle feedback