Trend Micro updated its suite of antivirus and Web security products with new capabilities to protect users from fake antivirus and scams on social networking sites. The new Titanium 2012 builds upon the security overhaul the company did for the security suite in 2010 by adding two new scanning engines to detect fake antivirus programs […]
The tremendous popularity of mobile devices and their subsequent appearance in the workplace means organizations have to worry about data-stealing malware as well as the danger of lost and stolen devices. The increased risk to personal and corporate data is an opportunity for the mobile-security industry, and the global market for mobile security is expected […]
Internet audience tracking and analytics firm comScore is being accused of surreptitiously collecting Social Security numbers, credit card information and passwords from consumers. The company is also accused of using its data collection software to tamper with user systems and stealing information from saved documents, according to a proposed class-action lawsuit filed in the United […]
The PHP Group has fixed the serious bug in the cryptographic function in PHP 5.3.7 and pushed out the fix a day later in the latest PHP 5.3.8. The PHP Group released PHP 5.3.7 on Aug. 18, but developers were told to not upgrade to that version after the bug in how the crypt() function […]
Facebook will be rolling out a number of new security and privacy features that will make the social networking site more like Google+. The social networking giant announced a “bunch of improvements that make it easier to share posts, photos, tags and other content with exactly the people you want,” according to an Aug. 23 […]
Google’s Android has overtaken Java Micro Edition as the most attacked mobile platform, McAfee said in its latest quarterly threat report. Out of about 1,200 mobile malware samples that McAfee Labs collected and analyzed in the second quarter of 2011, about 60 percent were aimed at Android, McAfee said in its 2011 Threats Report for […]
Researchers have uncovered the first malware using the “Gingerbreak” root exploit for Android 2.3, code-named “Gingerbread.” GingerMaster, a variant of the DroidKungFu malware that appeared earlier this year, has a root exploit that gives the attacker control of the infected device, Xuxian Jiang, an associate professor at North Carolina State University’s department of computer science, […]
A military documentary broadcast in China appears to have some screenshots of what may be software designed for cyber-warfare attacking a server in the United States. The Epoch Times, a publication founded by members of the Falun Gong, a religious organization banned in China, first noticed the software in the video clip. The software has […]
Apple has told software developers to stop using the unique identifier that would allow companies to track users and their behavior when developing iPhone and iPad apps. The Apple Website for iOS developers said the use of the Unique Device Identifier will be “deprecated” in iOS 5, TechCrunch reported on Aug. 19. Apple just released […]
Microsoft has removed the tracking cookie from MSN.com that could stealthily track users on the site even after the user deleted all cookies from the Web browser. The code used on MSN.com that was responsible for the “supercookies” had already been slated for removal, Mike Hintze, Microsoft’s associate general counsel for regulatory affairs, said Aug. […]