Add to MyYahoo RSS

Spyware News

News on Spyware continually updated from thousands of sources around the net.

3 hrs ago | Chain Store Age

Three Steps Retailers Should Take to Protect Against Backoff Malware

Retailers working to improve their security posture have a new threat to consider: Backoff malware.


Related Topix: Science / Technology

Wed Aug 20, 2014

Boy Genius

Watch out for this frighteningly smart malware that's infected over 75,000 jailbroken iPhones

The malware protection that comes with Apple's walled-off garden is only so good as long as you stay in that confined space, as otherwise hackers will be able to attack you with malicious programs.


Related Topix: Science / Technology, Home Gardening, Home, Computer Security

EFF to Ethiopia: Illegal Wiretapping Is Illegal, Even for Governments

Earlier this week, EFF told the U.S. District Court for the District of Columbia that Ethiopia must be held accountable for its illegal wiretapping of an American citizen.


Related Topix: World News, Ethiopia, Africa, District of Columbia Government, Washington DC, Science / Technology, Computers

Tue Aug 19, 2014

Emsisoft Emergency Kit v9.0.0.4353

The Emsisoft Emergency Kit contains a collection of programs that can be used without software installation to scan for malware and clean infected computers: Emsisoft Emergency Kit Scanner, Emsisoft Commandline Scanner and Emsisoft BlitzBlank.


Related Topix: Science / Technology, Computers

Fake Evernote extension injects ads into webpages

There, it does not ask the user to install the app-- again, it believes that the app is already installed, and instead offers the option to launch it.


Related Topix: Science / Technology

State-of-the-art spear phishing and defenses

The number of phishing sites was up 10.7-percent as of Q1 this year while at the same time almost 32.7-percent of PCs globally were infected with malware, including adware and spyware, indicating that phishing is an increasing issue for the enterprise, according to a report from the Anti-Phishing Working Group of the Internet Engineering Task ... (more)


Related Topix: Science / Technology

PC Magazine

New Antivirus Test Champ: Microsoft

Automatic Renewal Program: Your subscription will continue without interruption for as long as you wish, unless you instruct us otherwise.


Related Topix: Microsoft, Startups, Sentillion, Science / Technology

Capital Weekly

A Matter of "When," not "If"

One of the fastest growing claim areas in our industry is loss from data/privacy breach.


Related Topix: Privacy, Science / Technology

Mon Aug 18, 2014

Wall Street Journal

Symantec Overhauling Norton Security Line

The new product, called Norton Security, doubles down on the company's renewed focus on subscription models.


Related Topix: Startups, Symantec, Science / Technology, Email Spam, PC

Aurora Era-Banner

Why Ebola might give your computer a virus

Fears over the Ebola virus are being exploited by hackers in several malware and phishing campaigns, according to security firm Symantec.


Related Topix: Science / Technology, Computer Security

Sun Aug 17, 2014


Stellar Phoenix Outlook Express Repair (formerly Stellar Phoenix...

In spite of any type of security measures, files get corrupted all the time and they become unusable, leaving you unable to retrieve the lost data.

1 comment

Related Topix: Science / Technology

Sat Aug 16, 2014

Did a Defense Contractor Create the Next Generation of Spyware Weaponry?

The Washington Post relates a fascinating little cloak-and-dagger story that ends with a heck of a punchline: a U.S. defense contractor was apparently working with foreign companies that create spyware and virus programs to develop new tools for spying on people, potentially both foreign and domestic.


Related Topix: Science / Technology, The Washington Post Company, CloudShield, Computer Security, Computers, Marketing

Fri Aug 15, 2014

Computer Weekly

Google Chrome warns of deceptive software downloads

Google is to update the Safe Browsing feature of its Chrome browser to warn users about deceptive software downloads that make unexpected changes to computers.


Related Topix: Google, Startups, Computers, Science / Technology


The iPhone and iPad may be losing their enterprise luster

As I wrote last week, Apple seems to be reversing the Android dominance in the market as a whole or at least slowing it.


Related Topix: Ipad, Science / Technology, Apple, Startups, iPhone, Google, Las Vegas, NV

Thu Aug 14, 2014


Dead celebrities and identity theft

America loves celebrities. Scam artists, the only criminals we refer to as artists, are well aware of our fascination with the lives and sometimes untimely deaths of celebrities, and exploit this interest through a number of schemes aimed at turning the public's fascination into the identity thief's treasure.


Related Topix: Criminal Defense Law, Law, Computer Security, Science / Technology


Detecting and avoiding The Mask malware

Enterprise threats expert Nick Lewis explains how to detect and avoid one of the most advanced malware threats: The Mask.


Related Topix: Science / Technology


IT Blogwatch: NSA can start Judgment Day! The Skynet is falling

Another day, another scary thing we learn about the NSA. In a recent interview, whistleblower Edward Snowden tells us to fuhgeddaboudit when the NSA gets its wires crossed.


Related Topix: Science / Technology


Android Trojan Passes Off Crafty RAT as ESET Security Software

Security firm ESET has discovered a crafty Android 'backdoor' remote access Trojan passing itself off as a variety of apps, including the firm's own Mobile Security software.


Related Topix: Science / Technology, Google, Startups, Widevine Technologies

Wed Aug 13, 2014


NSA spying might have affected U.S. tech giants more than we thought

Spying by the National Security Agency and increasing demands by the feds for client data continues costing U.S. IT giants billions in lost revenue while also damaging reputations of the American company's themselves.


Business Journal

A look at DFW's 5 fastest growing mid-size tech firms

The Metroplex Technology Business Council and TeXchange DFW honored North Texas' five fastest-growing mid-size tech firms and one small-size firm expected to be an upcoming mover and shaker.


Related Topix: Science / Technology, Marketing


Spyware Jobs