Eastern European-based attackers gained access to the networks of energy providers by tampering with software updates for industrial control systems, gaining a foothold that could be used for sabotage, Symantec said Monday.
Microsoft has taken legal action to combat the spread of malware that the company says can be traced to bad actors in Kuwait and Algeria.
There is yet another reason to be wary of spam email about bank transfers or invoices -- it could be carrying a new, cleverly designed malware program that steals financial information.
A rare Android worm that propagates itself to other users via links in text messages has been discovered by security researchers.
Malicious software that swaps itself for legitimate online banking applications is striking users in South Korea, with thousands of devices infected in the last week, according to a Chinese mobile security company.
A European bank may have lost as much as €500,000 (US$682,000) in a week earlier this year, according to Kaspersky Lab, which analyzed data on a server used in attacks against online banking users in Italy and Turkey.
Governments are increasingly using spyware for mobile devices to monitor targets, raising questions over the possible misuse of such tools, a new study suggests.
Following a downward trend during the past two years, the number of new rootkit samples rose in the first quarter of this year to a level not seen since 2011, according to statistics from security vendor McAfee.
A malware threat previously used in attacks against energy sector companies is now being aimed at organizations that use or develop industrial applications and machines.
AskMen.com, a popular website with millions of monthly visitors, was redirecting visitors to other domains that delivered the Caphaw malware, according to security vendor WebSense.
An unknown person or group reportedly stole the cryptographic key used by Nokia to digitally sign applications for Symbian OS and extorted millions of euros from the company in 2007 by threatening to make the key public.
A vulnerability allows attackers to disable Microsoft's antimalware products by sending specifically crafted files to users via websites, email or instant messaging applications.
Victims of Simplocker, the first file-encrypting ransomware threat for Android devices, can recover files without paying cybercriminals because the malicious program uses a hardcoded encryption key.
Security researchers said they've spotted a new type of banking malware that rivals the capabilities of the infamous Zeus malware.
A hacker exploited publicly known vulnerabilities to install malware on network-attached storage systems manufactured by Synology and used their computing power to generate Dogecoins, a type of cryptocurrency.
Most Popular Reviews
- 1 2016 Ford Mustang EcoBoost review
- 2 Synology DS216+ Review
- 3 Review: TCL C1 series 4K TV
- 4 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 5 LG 55EG960T OLED UHD TV
Join the Good Gear Guide newsletter!
Best Deals on Good Gear Guide
Latest News Articles
- How to stop hackers from reaching your deleted files
- Six quick steps to start a Digital Detox
- How to upgrade to Windows 10: What you need to know
- Alphabet will work with more auto makers on self-driving cars
- Intel has quietly snuffed out its Project Tango smartphone as it rethinks augmented reality
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTSocial Media AssistantQLD
- CCSenior Project ManagerACT
- FTEmbedded Software EngineerWA
- FTFull Stack DeveloperNSW
- CCCRM Technical Consultant / DeveloperNSW
- CCCisco CCIE Certified Network EngineerWA
- FTTechnical LeadWA
- CCLead Business AnalystNSW
- CCIP Test Analyst - Baseline Security ClearanceVIC
- CCPeopleSoft Consultant (Financial)NSW
- CCService Design AnalystNSW
- CCServiceNow Technical LeadNSW
- CCPractice Lead - Java, FrontendVIC
- CCUX/UI Designer DeveloperWA
- FTSenior Oracle Functional Analyst (Finance)VIC
- CCInfrastructure Project ManagerACT
- FTSystems EngineerNSW
- FTApplication Support AnalystSA
- CCNetwork ArchitectNSW
- CCVendor ManagerVIC
- CCProject Manager- Radio CommunicationsVIC
- CCFrontend DevelopersQLD
- CCBPM Solution ArchitectVIC
- CCSAP BODS ConsultantNSW
- FTMidrange Server Provision SMENSW