8 hrs ago
Watch out for this frighteningly smart malware that's infected over 75,000 jailbroken iPhones
The malware protection that comes with Apple's walled-off garden is only so good as long as you stay in that confined space, as otherwise hackers will be able to attack you with malicious programs.
21 hrs ago
EFF to Ethiopia: Illegal Wiretapping Is Illegal, Even for Governments
Earlier this week, EFF told the U.S. District Court for the District of Columbia that Ethiopia must be held accountable for its illegal wiretapping of an American citizen.
Tue Aug 19, 2014
Emsisoft Emergency Kit v188.8.131.5253
The Emsisoft Emergency Kit contains a collection of programs that can be used without software installation to scan for malware and clean infected computers: Emsisoft Emergency Kit Scanner, Emsisoft Commandline Scanner and Emsisoft BlitzBlank.
Fake Evernote extension injects ads into webpages
There, it does not ask the user to install the app-- again, it believes that the app is already installed, and instead offers the option to launch it.
State-of-the-art spear phishing and defenses
The number of phishing sites was up 10.7-percent as of Q1 this year while at the same time almost 32.7-percent of PCs globally were infected with malware, including adware and spyware, indicating that phishing is an increasing issue for the enterprise, according to a report from the Anti-Phishing Working Group of the Internet Engineering Task ... (more)
New Antivirus Test Champ: Microsoft
Automatic Renewal Program: Your subscription will continue without interruption for as long as you wish, unless you instruct us otherwise.
A Matter of "When," not "If"
One of the fastest growing claim areas in our industry is loss from data/privacy breach.
Mon Aug 18, 2014
Wall Street Journal
Symantec Overhauling Norton Security Line
The new product, called Norton Security, doubles down on the company's renewed focus on subscription models.
Why Ebola might give your computer a virus
Fears over the Ebola virus are being exploited by hackers in several malware and phishing campaigns, according to security firm Symantec.
Sun Aug 17, 2014
Stellar Phoenix Outlook Express Repair (formerly Stellar Phoenix...
In spite of any type of security measures, files get corrupted all the time and they become unusable, leaving you unable to retrieve the lost data.
Sat Aug 16, 2014
Did a Defense Contractor Create the Next Generation of Spyware Weaponry?
The Washington Post relates a fascinating little cloak-and-dagger story that ends with a heck of a punchline: a U.S. defense contractor was apparently working with foreign companies that create spyware and virus programs to develop new tools for spying on people, potentially both foreign and domestic.
Fri Aug 15, 2014
Google Chrome warns of deceptive software downloads
Google is to update the Safe Browsing feature of its Chrome browser to warn users about deceptive software downloads that make unexpected changes to computers.
The iPhone and iPad may be losing their enterprise luster
As I wrote last week, Apple seems to be reversing the Android dominance in the market as a whole or at least slowing it.
Thu Aug 14, 2014
Dead celebrities and identity theft
America loves celebrities. Scam artists, the only criminals we refer to as artists, are well aware of our fascination with the lives and sometimes untimely deaths of celebrities, and exploit this interest through a number of schemes aimed at turning the public's fascination into the identity thief's treasure.
Detecting and avoiding The Mask malware
Enterprise threats expert Nick Lewis explains how to detect and avoid one of the most advanced malware threats: The Mask.
IT Blogwatch: NSA can start Judgment Day! The Skynet is falling
Another day, another scary thing we learn about the NSA. In a recent interview, whistleblower Edward Snowden tells us to fuhgeddaboudit when the NSA gets its wires crossed.
Android Trojan Passes Off Crafty RAT as ESET Security Software
Security firm ESET has discovered a crafty Android 'backdoor' remote access Trojan passing itself off as a variety of apps, including the firm's own Mobile Security software.
Wed Aug 13, 2014
NSA spying might have affected U.S. tech giants more than we thought
Spying by the National Security Agency and increasing demands by the feds for client data continues costing U.S. IT giants billions in lost revenue while also damaging reputations of the American company's themselves.
A look at DFW's 5 fastest growing mid-size tech firms
The Metroplex Technology Business Council and TeXchange DFW honored North Texas' five fastest-growing mid-size tech firms and one small-size firm expected to be an upcoming mover and shaker.
Microsoft whacks Apple with new Surface Pro 3 ads
Microsoft is taking on Apple's MacBook Air with a trio of new ads, doubling down on its contention that the Surface Pro 3 is a better laptop than the real laptop.