Malware

Getting Rid of Lenovo’s Superfish Vulnerability

Posted In Data, Living in Tech
SuperFish
As you may have heard by this point, Lenovo loaded an adware package called Superfish Visual Discovery onto many of its devices. Annoying? Absolutely: Nobody likes an add-on that inserts sponsored links into your search results. But Superfish became downright dangerous when security researchers realized it could easily double as a handy tool for a man-in-the-middle attack, thanks to its ability to always appear as a “Trusted Party” to websites. The revelations have left Lenovo scrambling to repair the damage.… continue…

Report: Calif. is Prime Target for Global Cybercrime

Posted In DataCenter
shutterstock_135532622_EmiliaUngur-
A report from the California Attorney General claims the state’s success in business, especially high-tech, makes it a target for cybercrime. continue…

Report: Target Bosses Ignored IT Alert of Impending Breach

Posted In DataCenter
shutterstock_178058519_Rob-Wilson
Target IT spotted BlackPOS malware while it was still being installed, but bosses ignored warnings, according to an investigation by Bloomberg. continue…

Expert: Real Cyberwar Will be Worse Than Ukraine-Russia Fight

Posted In DataCenter
Both sides use the Internet well, but can’t attack “real things” from cyberspace. continue…

Target Axes CIO as Part of IT Security Overhaul

Posted In DataCenter
CIO Beth Jacobs, credited with updating Target’s Web, mobile and POS, took the fall for Target’s massive data breach. continue…

Identity Theft Tops FTC Complaint List, Again

Posted In DataCenter
Identity theft continues to top consumer complaints, but the fraud that accompanies it is happening in many more ways than in the past. continue…

Home Routers Pose Biggest Consumer Cyberthreat

Posted In DataCenter
Security firms conclude there are so many vulnerabilities in home routers, the hardware is almost impossible to secure. continue…

Stop Botnets by Knowing a Zombie from a User

Posted In DataCenter
Web traffic from a zombie asking for orders from its botnet can look almost identical to ‘normal’ network traffic; the key is to focus on the ‘almost.’ continue…

Malware Wrapper Uses Windows to Infect Android

Posted In DataCenter
Most malware writers treat Windows as the ultimate target; a new wrapper on an existing Trojan inverts that idea, using Windows to infect Android devices. continue…