Customers of storage and networking equipment manufacturer Buffalo who downloaded certain files from the company's website in Japan last week might have had their computers infected with an online banking Trojan.
An Adobe Flash player vulnerability is being used in attacks on a massive scale against Web users, mostly in Japan, to collect online banking details, according to new research from Symantec.
Symantec said Wednesday it closed a deal last week to acquire NitroDesk, which makes security and management applications for mobile devices.
Despite a leak of its source code, an Android program aimed at compromising online bank accounts is still commanding US$5,000 per copy, one of the highest prices seen for a type of malware, according to research from Symantec.
Symantec's latest product, Norton Small Business, is perhaps the most well-rounded offering the company has inserted into its product array for small companies.
Law enforcement agencies from 16 countries on three continents last week arrested 97 people after executing raids targeting those suspected of creating, buying and using a notorious Trojan program called BlackShades.
Further investigation into an exploit kit known as "Elderwood" shows the attackers using it are more numerous and possibly better funded than previously thought, according to new research from Symantec.
The sole target detected by Symantec of attacks using a recent Internet Explorer vulnerability was the website of the Japan Basketball Association, whose chairman is a high-ranking Japanese government official.
Symantec has seen another round of a ham-fisted but surprisingly successful attack that targets Facebook users hoping to break into their friends' accounts.
A cybercriminal operation that combines phone-based social engineering attacks with spear phishing and malware to steal money from organizations has resurfaced this year, finding victims in French-speaking countries in particular.
Website and server administrators will have to spend considerable time, effort and money to mitigate all the security risks associated with Heartbleed, one of the most severe vulnerabilities to endanger encrypted SSL communications in recent years.
Jose Vildoza's 62-year-old father was using his old Windows computer when a warning in broken English flashed on the screen: your files have been encrypted.
Cybercriminals have been developing increasingly sophisticated malware that make use of Windows PowerShell scripts in an attempt to fly under the radar.
A malicious software program that encrypts a person's files until a ransom is paid has a crucial error: it leaves the decryption key on the victim's computer.
A group of enterprising cybercriminals have figured out how to get cash from a certain type of ATM -- by text message.
Most Popular Reviews
- 1 2016 Ford Mustang EcoBoost review
- 2 Synology DS216+ Review
- 3 Review: TCL C1 series 4K TV
- 4 Tech21 Evo Xplorer iPhone case review
- 5 LG 55EG960T OLED UHD TV
Join the Good Gear Guide newsletter!
Latest News Articles
- Check out our Father’s Day Gift Guide
- Stratasys unveils mega, robotic 3D printers to build large parts
- iOS 10 gives apps room to grow
- Google is bringing its Wi-Fi Assistant feature to all Nexus phones
- How Moto Mods went from concept to product
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- FTMiddleware - DevOps EngineerVIC
- CCSenior Project ManagerNSW
- CCDesktop Support AnalystSA
- CCSenior Security Specialist - McAfeeVIC
- CCContract Analyst Programmer (JAVA/SQL) 160824/AP/531Asia
- CCData/ Business AnalystVIC
- FTBusiness Development ManagerVIC
- FTProject ManagerNSW
- CCProject AnalystVIC
- CCContract Systems Analyst (.Net/SQL Server) 160829/SA/244Asia
- FTBusiness Development Manager | ICT intelligent systems integrationVIC
- CCContract Analyst Programmer (JAVA/SQL) 160826/AP/972Asia
- FTIT Security & Risk ManagerNSW
- CCContract Analyst Programmer (JAVA/J2EE/SQL) 160824/AP/187Asia
- CCEmail Production SpecialistNSW
- CCPMO Project AdministratorNSW
- FTPrincipal Business Consultant- Wealth ManagementNSW
- CCContract Senior Web Developer (PHP/Drupal/JAVA) 160808/SWD/vtdAsia
- CCChange AnalystVIC
- CCInfrastructure Security EngineerNSW
- CCICT Security Design & Implementation - NV1ACT
- CCSr. SQL Server DBANSW
- CCSenior Systems Integration Engineer (HIB)SA
- CCBI-Business Intelligence Technical LeadNSW
- CCContract Systems Analyst (Datacentre Maintenance) 160817/SA/993Asia