Windows Internet Explorer 10 Consumer Preview privacy statement

At Microsoft, we’re working hard to protect your privacy while delivering products that bring you the performance, power, and convenience you desire in your personal computing. This privacy statement for Internet Explorer 10 Consumer Preview(“Internet Explorer”) focuses on features that communicate with the Internet, explains how those features collect your data, and describes the way that data is used. This privacy statement is a preliminary disclosure that focuses on features that communicate with the Internet and isn’t intended to be an exhaustive list. It doesn’t ...

Continue Reading →
0

How to report a computer crime: Unauthorised email account access

Do you know how to report a computer crime? Or even who you would report it to?

Well, there is no one size fits all solution – it depends on the individual circumstances and where you are in the world – but we’ve drawn up some scenarios that are typical of some of the crimes that any computer user, at home or work, might come across.

In the first of our series ...

Continue Reading →
0

Google no longer playing with Android malware

The Android malware war is heating up. On Wednesday, the mobile security firm TrustGo confirmed a new Trojan app, named Trojan!FakeLookout.A, hidden in what appeared to be an update to the mobile security app Lookout Mobile Security for Android.

While there have been less than 100 users infected with Trojan!FakeLookout.A, it shows the danger lurking in the Google Play store. While still a minuscule percentage of malware threats, the growth is accelerating according to McAfee which recently reported that mobile malware ...

Continue Reading →
0

Cyberwar is happening now: turn your sysadmins into heroes

Information security is right on the cusp of a “huge shift” in the way things are done in the US, and, by extension, around the world. The next few months will be “transformational,” Paller told security professionals in Sydney yesterday.

aller’s message? “Stop paying people to tell you what to do. Pay people to do it.”

Things began changing after the revelation of the Operation Auroraattacks against Google, Adobe, ...

Continue Reading →
0

Code in Aramco Cyber Attack Indicates Lone Perpetrator

Within hours after a virus had devastated the computer network of Saudi Arabian Oil Co., the world’s largest state-owned crude oil exporter, investigators began searching for evidence of who was behind the attack.

Although anonymous U.S. officials have been suggesting that Iran was to blame for the Aug. 15 attack, the cyber detectives say the virus’s code had none of the sophisticated ...

Continue Reading →
0

Latest Cybercrime Threat: Device Cloning

While much of the banking industry is distracted by the recent spate of distributed denial of service attacks, a new wave of cybercrime is about to hit online and mobile banking users’ devices.

In this scheme, crooks are creating virtual machines that are clones of customers’ real computers or mobile devices, including their IP addresses. Then many of the methods banks use to authenticate a customer can be compromised without the bank or consumer being aware. “This is an ‘in ...

Continue Reading →
0

National Cyber Security Awareness Month

Who hasn’t heard of “National Pest Management Month,” “National Ice Cream Month,” “National Pizza Month,” “National Care about Your Indoor Air Month” or, if you’re not fond of supporting indoor air, “National Great Outdoors Month”? Frankly, we hadn’t.

While many observances are of doubtful value to most Americans (the now defunct “National Catfish Day” for example), “National ...

Continue Reading →
0

Close the gaps for cybercriminals

ThreatMetrix™ employs a range of techniques to gather details about a web transaction: from the device, the connection, and optionally shared transaction details. We then correlate this data with past transactions to identify anomalies, risk factors, and suspicious behavior.

Drawing upon hundreds of anonymous characteristics from a web transaction and analyzing them in real-time, ThreatMetrix reveals hidden truths about the device visiting your ...

Continue Reading →
0

Mini Flame

Kaspersky Lab Discovers “miniFlame,” a New Malicious Program Designed for Highly Targeted Cyber Espionage Operations

Today Kaspersky Lab announced the discovery of miniFlame, a small and highly flexible malicious program designed to steal data and control infected systems during targeted cyber espionage operations.
miniFlame, also known as SPE, was found by Kaspersky Lab’s experts in July 2012, and was originally identified as a Flame module. However, in September 2012, Kaspersky Lab’s research team conducted an in-depth analysis of Flame’s command & ...

Continue Reading →
0
Page 10 of 11 «...7891011