Bookmark

Add to MyYahoo RSS

Spyware News

News on Spyware continually updated from thousands of sources around the net.

46 min ago | MacInTouch

Report: Security

MacInTouch pointed out a Brian Krebs article, "Beware Keyloggers at Hotel Business Centers", which talks about how "The U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers, warning that crooks have been compromising hotel business center PCs with keystroke-logging malware ... (more)

Comment?

Related Topix: Computers, Science / Technology, Apple, Criminal Defense Law, Law, Computer Security, PC

5 hrs ago | 2-spyware.com

Security experts warn about reappearance of Delta Homes virus

Delta-homes.com, a search engine that was originally created for collecting revenue from advertising, has recently renewed its activity.

Comment?

Related Topix: Science / Technology, Internet, Computer Security, Emerging Technology, Search Engines

Wed Jul 30, 2014

GHacks

How to deal with Potentially Unwanted Programs

If you are running a modern security suite, chance is that you may have received notifications about so-called PUP or PUA on the PC.

Comment?

Related Topix: PC, Science / Technology, Computers

Tom's Hardware

Big Android "Fake ID" Security Threat Uncovered

Bluebox Labs, a part of Bluebox Security, has discovered a flaw in Android that allows malware to pose as legitimate apps.

Comment?

Related Topix: Science / Technology, Google, Startups, Widevine Technologies

PC Magazine

One Year Later: Lookout's War on Android Adware

Automatic Renewal Program: Your subscription will continue without interruption for as long as you wish, unless you instruct us otherwise.

Comment?

Related Topix: Science / Technology, Google, Startups

Tue Jul 29, 2014

Slashdot

Hackers Plundered Israeli Defense Firms That Built 'Iron Dome' Missile Defense

An anonymous reader writes: Brian Krebs reports on information from Columbia, Md.-based threat intelligence firm Cyber Engineering Services Inc. that attackers thought to be operating out of China hacked into the corporate networks of three top Israeli defense technology companies .

Comment?

Related Topix: Strategic Defense Initiative, Computer Security, Science / Technology, Columbia, MD, Wi-Fi

Ars Technica

Android crypto blunder exposes users to highly privileged malware

The majority of devices running Google's Android operating system are susceptible to hacks that allow malicious apps to bypass a key security sandbox so they can steal user credentials, read e-mail, and access payment histories and other sensitive data, researchers have warned.

Comment?

Related Topix: Google, Startups, Science / Technology

Mon Jul 28, 2014

ITworld

Attackers install DDoS bots on Amazon cloud, exploiting Elasticsearch weakness

Attackers are exploiting a vulnerability in distributed search engine software Elasticsearch to install DDoS malware on Amazon and possibly other cloud servers.

Comment?

Related Topix: Amazon, Internet, Science / Technology, Programming Languages, Widevine Technologies, Emerging Technology, Search Engines

Aurora Era-Banner

Koreans are being targeted with memo malware

Hackers are attacking a Korean organisation with malware disguised as an internal memo offering a free car inspection, according to security firm Symantec.

Comment?

Related Topix: Science / Technology, Computer Security

Fri Jul 25, 2014

TechTarget

Undocumented iOS diagnostic features spark iPhone backdoor concerns

News roundup: The revelation of potential iOS backdoors -- and Apple's perceived acknowledgement of them -- has sparked debate over the definition of a backdoor and raised concerns over iOS security.

Comment?

Related Topix: Science / Technology, iPod touch App, iPad App, Twitter, iPhone and iPad App, iPhone App, Apple, Startups, Science, Computer Science, iPod

The Washington Post

ellen_nakashima

A little over a decade ago, federal prosecutors used keystroke logging software to steal the encryption password of an alleged New Jersey mobster, Nicodemo Scarfo Jr., so they could get evidence from his computer to be used at his trial.

Comment?

Related Topix: Science / Technology, Drug Enforcement Administration, US Politics, US News

2-spyware.com

Helpful tips on how to protect your smartphone/tablet

You have probably heard the term 'Adware'. This term describes an advertising-supported software, which seeks to make a profit out of commercial advertisements.

Comment?

Related Topix: Science / Technology, Computer Security, Altor Networks, Cell Phones, Electronics

InfoWorld

Thousands of sites compromised through WordPress plug-in vulnerability

A critical vulnerability found recently in a popular newsletter plug-in for WordPress is actively being targeted by hackers and was used to compromise an estimated 50,000 sites so far.

Comment?

Related Topix: Science / Technology, Computer Security

Thu Jul 24, 2014

Examiner.com

Why and How to Remove 'Ads by Supra Savings' from Your Computer

If you want to save money while shopping online you should not trust applications like SupraSavings.

Comment?

Related Topix: Science / Technology

Northwest Florida Daily News

Looking through the - Glass'

"You never know who you're going to inspire to become the next Einstein, Madame Curie, Sir Isaac Newton," Carmine said.

Comment?

Related Topix: Science / Technology

Filehippo.com

AntiLogger 1.7.2.370

AntiLogger is a very powerful and efficient app which blocks hackers. Although the applicaton is very lightweight, it can detect any attempts to modify your computer's settings and place malicious code in your system.

Comment?

Related Topix: Science / Technology, Computer Security

Examiner.com

How to Delete iStart Browser Virus and Why Deleting It Is Important

The good thing about such browser hijackers as istart123.com is that they do not try to infect you with malware directly.

Comment?

Related Topix: Science / Technology, Computers, Internet

Hispanic Business

Researchers Submit Patent Application, 'Anti-Malware System, Method...

News editors obtained the following quote from the background information supplied by the inventors: "The present disclosure relates to a system for use in providing a security solution, and more particularly, to a system including a hardware-based anti-virus engine and to a method of processing data in such a system.

Comment?

Related Topix: Science / Technology, Inventions, CPU

The Indian Express

Hacking virus a Bladabindia prowling in Indian cyberspace

Some of the Bladabindi variants could capture keyboard press, control computer camera and later send collected sensitive information to remote attacker.

Comment?

Related Topix: Keyboards, Science / Technology, Computer Security

Wed Jul 23, 2014

Ars Technica

Mass exploit of WordPress plugin backdoors sites running Joomla, Magento too

As many as 50,000 websites have been remotely commandeered by attackers exploiting a recently patched vulnerability in a popular plugin for the WordPress content management system, security researchers said Wednesday.

Comment?

Related Topix: Science / Technology

•••
•••
•••
•••

Spyware Jobs

•••
•••
•••
•••