To paraphrase an old expression: Give a man an apple and you feed him for a day; teach a man to phish apple IDs and you feed him for a lifetime -- with stolen data. That's what some bold phishers are hoping for, according to a new report by security intelligence company Trend Micro, which documents a major phishing scam that has already compromised 110 sites in a plan to steal Apple IDs.
In one of the first independent tests of third-party security suites on Windows 8, nearly all antivirus and anti-malware software tested well. What may surprise you is that even without a third-party suite, Windows 8 is relatively resistant to modern threats like zero-day attacks, according to the report.
Independent German security suite evaluators AV-Test.org publish bimonthly tests that rate the effectiveness of the biggest Windows security suites out there and rated all 26 of the suites they tested on Windows 8 in January and February as "certified," including Windows 8 itself. This is because Windows 8 comes … Read more
In the OS X Security system preferences you can set the system to require a password when the system wakes from sleep or after the screensaver has been active for a period of time. However, you may run into a few cases in which entering your account password then does not work.
One cause can be if you have recently changed the name of your user account. For authentication, OS X will use either the short or long username, along with any aliases that you have associated with your account. However, if you have changed the long username for your … Read more
"[U]sing information from a 10-country survey of … Read more
Security company Dr. Web is reporting on a new adware Trojan attack that is targeting Mac users, where malicious Web sites will trick users into installing a plugin that will track your browsing and display ads to you.
The malware, called "Yontoo," will be first encountered as a media player, download manager, or other plug-in requirement for viewing contents on some maliciously crafted Web sites disguised as sources for file sharing and movie trailers. When the plug-in prompt is clicked, you're redirected to a site that downloads the Trojan installer and requires you to run it. The … Read more
The next time you're looking for your misplaced Android smartphone, check the freezer. It's possible, however unlikely, that someone is trying to hack into your data using a new FROST attack method.
Researchers at Friedrich-Alexander University in Germany have learned that it is possible to access personal information on Android 4.0 smartphones using a chilling technique.
Called FROST, or forensic recovery of scrambled telephones, it amounts to placing the phone in temperatures of -15 Celsius for roughly 1 hour. After removing from a freezer, you must repeatedly power on and off the phone and hold down the … Read more
If you are considering security software for your Mac there are a number of options out there, including those from popular companies like Sophos, Symantec, and Intego. There are both free tools and paid subscriptions to choose from.
A while ago I gave Intego's SecurityBarrier X6 suite a spin, which in testing has been found to be one of the better-performing anti-malware tools for OS X; however, the software did require a bit of a technical approach that was not too appealing to the average user.
SAN FRANCISCO--Of all the multitudes of phones launching amid the grandeur of Barcelona this week, Motorola Solutions quietly broke champagne over one device from the back corner of a convention center here.
The Motorola AME 2000, originally announced a few weeks back, is not a phone for the average consumer. That makes sense, given that its public bow was at the RSA Conference 2013 this week, an annual confab of security nerds, experts, researchers, enterprise security vendors, and government representatives.
The new version of the Avast security suite focuses on repairing the past mistakes of Windows. Debuting today exclusively with CNET's Download.com, Avast 8 addresses some of today's most pressing security concerns but leaves at least one other growing problem unresolved.
All told, Avast Free Antivirus 8 (download), Avast Pro Antivirus 8 (download), Avast Internet Security 8 (download) and the new top-tier suite, Avast Premier 8 (download) command upwards of 170 million active users, making Avast the most popular consumer security suite by a long shot.
Although the suite leaves privacy in the cold, the rest of … Read more
The New York Times' report Monday of state-sponsored hacking in China drew new attention to the sophisticated techniques that would-be infiltrators use to gain access to victims' accounts. But it's not just China, Google said today -- the techniques used against U.S. government agencies and corporations are being used increasingly by hackers around the world.
"Compared to five years ago, more scams [and] illegal, fraudulent, or spammy messages today come from someone you know," security engineer Mike Hearn said in a blog post. "Although spam filters have become very powerful -- in Gmail, less than … Read more