Malware and Vulnerabilities Topic Center
Get the latest news, advice and in-depth analysis on malware, including information on viruses, worms, Trojans and zero-day vulnerabilities
Malware and Vulnerabilities News
Fake AdBlock Plus app removed from Google's Play store
Google has removed an application from its Play store that purported to be AdBlock Plus, a well-known application that blocks online ads.
Read more...
Security company scours 'Dark Web' for stolen data
Alex Holden, founder of security company Hold Security, is in the business of bringing companies bad news.
Symantec seizes part of massive P2P botnet ZeroAccess
The cybercriminals behind ZeroAccess, one of the largest botnets in existence, have lost access to more than a quarter of the infected machines they controlled because of an operation executed by security researchers from Symantec.
Fort Disco malware is now targeting email and FTP servers
A piece of malware designed to launch brute-force password guessing attacks against websites built with popular content management systems like WordPress and Joomla has started being used to also attack email and FTP servers.
Google finally squashes IM bug
Google is still tussling with a scary and disconcerting glitch that caused its IM apps to route messages to the incorrect recipients.
IE zero-day vulnerability exploited more widely than previously thought
A recently announced and yet-to-be-patched vulnerability that affects all versions of Microsoft Internet Explorer (IE) has been exploited in targeted attacks against organizations in Taiwan since the beginning of July, according to security researchers.
Cisco IOS fixes 10 denial-of-service vulnerabilities
Cisco Systems has patched 10 vulnerabilities that could impact the availability of devices using various versions of its IOS software.
iOS 7 security update patches lockscreen flaw
Apple yesterday released an iOS 7 software update that fixes a security flaw that let users bypass the iPhone lockscreen to access a range of onboard information and online accounts.
'Icefog' spying operation targeted Japan, South Korea
A hacking group that targeted Japan's parliament in 2011 is believed to have conducted nimble data thefts against organizations mainly in South Korea and Japan, including defense contractors, over the past two years.
Apple cofounder Steve Wozniak expounds on his hacking shenanigans and online mischief
In his keynote address at a security conference today, Apple co-founder Steve Wozniak admitted he has enjoyed many adventures in hacking often for the sake of pranks on friends and family, especially back in his college days and the early years of working on computers and the Internet.
Malware and Vulnerabilities In Depth
7 sneak attacks used by today's most devious hackers
Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users
Security Manager's Journal: Android panic
Android smartphones and tablets have become ubiquitous at our manager's company. What happens now that the Android ecosystem appears to be riddled with security pitfalls?
Bit9 CEO: Trust-based model the new weapon in war against malware
Bit9 chief executive Patrick Morley talks mobile security, company partnerships with FireEye and Palo Alto Networks, and the evolving role of today's CISO
Security Manager's Journal: Upgrading, and looking for the best we can afford
Several of the company's security technologies are reaching end of life. It's a new experience for our manager to be improving security measures instead of closing gaps.
Targeted attacks up over 2012, SMBs increasingly at risk: Symantec
The number of targeted attacks almost doubled in 2012 compared to the prior year.
At RSA, specious arguments against security awareness
A debate requires intelligent dialogue from representatives on both sides of an issue. That's not what happened at the RSA conference panel on security awareness.
IT Concerns About Targeted Malware Rising
IT and security professionals are increasingly concerned about targeted malware and data breaches. What's worse is that their confidence in their ability to identify and stop them is waning.
Security Manager's Journal: R&D's new security lab is a promising step
For once, security isn't an afterthought, as the R&D department plans its own sandbox for testing the company's software products.
Kenneth van Wyk: Staying out of the belly of the Internet beasts
It's true: The Internet really is out to get us all. Here are a few steps you can take toward being safer every time you use the Web. (Insider; registration required)
Microsoft to roll out Windows Store app patches quickly
Microsoft will release security updates for applications in its Windows Store as those patches are available in order to speed up the updating process.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
Malware and Vulnerabilities White Papers
- Improving Legal Compliance Through Security Awareness Training
- A "big picture" understanding of legal and regulatory compliance
obligations and mitigating the security threat posed by an organization's own employees- the weak link... - Phishing Attacks: Are Your Organization's Email Addresses a Target?
- Your end-users are the weak link in your network security. Today, your employees are frequently exposed to advanced phishing attacks. Find out now...
- How Effective is Security Awareness Training?
- Anti-phishing solutions are critical in protecting an organization from the infiltration Web-based attacks. A technology-based solution is not enough.
- Security for Virtualization
- Learn more.
- The 10 "Must-Haves" for Secure Enterprise Mobility.
- A security framework and evaluators' checklist. All Malware and Vulnerabilities White Papers
Malware and Vulnerabilities Webcasts
- Move Beyond Point Solutions to Enterprise Mobility Management Mobile Minute: Moving to enterprise mobility management.
- Secure Mobile Email Users Will Love Maintain full control over sensitive corporate data
- Securing Mobile Devices with Citrix XenMobile MDM In this video, Chief Demo Officer, Brad Peterson provides a demo of how Citrix XenMobile MDM works.
- IBM Delivers Innovation On New x86 Systems and Solutions You need an IT infrastructure that provides scalability, performance and efficiency tailored to the specific goals of your business. Join us for this...
- Step Up to the IT Security Challenge Watch this video to discover exclusive market insights from independent analyst Kevin Bailey, Research Director, IDC, on the growing challenges faced by IT...
- All Malware and Vulnerabilities Webcasts