Hackers can find you by tracking your cellphone

Hackers can find you by tracking your cellphone


Hackers can find you by tracking your cellphone

Posted: 17 Feb 2012 07:18 AM PST

Finding out people's approximate whereabouts by tracing their cellphone signal is something that service providers can easily do, as cellular networks track its subscribers all the time in order to en...

Cutwail botnet intensifies spam spewing

Posted: 17 Feb 2012 06:45 AM PST

The old Cutwail botnet is still alive and spamming from its 1,5 million bots, and has lately been spotted using malicious HTML attachments. The spam emails vary from fake forwarded Xerox scans and ...

Secret ad code allows Google to bypass Safari's "no tracking" settings

Posted: 17 Feb 2012 04:41 AM PST

Once again, Google has been caught doing something that it shouldn't be doing: using code in their ads to intentionally bypass the privacy settings of Safari users in order to track their browsing beh...

How mobile malware is maturing

Posted: 17 Feb 2012 04:14 AM PST

Mobile malware has reached a new stage of maturation, according to Juniper Networks. Top findings from Juniper's 2011 Mobile Threats Report are evidence of accelerating attacks on mobile devices:...

Ransomware impersonates the Italian police

Posted: 17 Feb 2012 04:07 AM PST

Ransomware targeting Italian-speaking users is being served from compromised websites via malicious JavaScript code, warns Total Defense's Rossano Ferraris. The users are lured to the websites and ...

Open source tool detects videoconferencing equipment vulnerabilities

Posted: 17 Feb 2012 04:00 AM PST

Videoconferencing equipment has been in the news recently for its potential for use by attackers to snoop on confidential company meetings, view charts mounted on meeting room walls, or listen in on c...

Fake Facebook notification delivers keylogger

Posted: 17 Feb 2012 03:06 AM PST

Fake Facebook notifications about changes in users' account information have been hitting inboxes and delivering malware to unwary users, warn BarracudaLabs researchers. The email address of the se...

New powerful bot spreads by email

Posted: 17 Feb 2012 03:00 AM PST

PandaLabs reported the presence of a powerful new bot called Ainslot.L. This malware is designed to log user activities, download additional malware and take control of users' systems. Additionally...

Analyze mobile apps for malware threats

Posted: 17 Feb 2012 02:59 AM PST

Trend Micro announced Mobile App Reputation, a technology that can automatically identify, analyze and rate mobile applications for issues that could include malware, potential theft of private data a...

Cloudify cloud application platform

Posted: 17 Feb 2012 01:30 AM PST

GigaSpaces Technologies announced Cloudify, a cloud application platform that enables organizations to easily on-board and manage any application, on any cloud, with zero code change. Cloudify is...

Imation secures mobile data, identity and workspaces

Posted: 17 Feb 2012 12:30 AM PST

Imation announced its unified Secure Data, Identity and Mobile Workspace product set, which brings together a combination of encrypted USB storage devices and media, encryption and encryption key mana...

Cloud-based threat monitoring and response service

Posted: 17 Feb 2012 12:00 AM PST

FishNet Security launched ThreatDetect, a cloud-based threat monitoring and response service, that allows organizations to proactively respond to emerging threats, meet regulatory requirements and dec...

0 comments:

Post a Comment