Android Security – Malware Threat

Android Security Faces Huge Malware Threat             During the rise of the technological advancement, it has been evident that work has been made easier, communication became faster as time went buy, and information has been readily accessible to almost everyone with just a few punches on our laptops.   However, nobody really noticed that some people are starting to abuse the advancement of technology against the security. In the words of Andrea Lelli, Symantec Senior Software Continue Reading

Study Findings Inspire Privacy Protection iOS App

In a recent study done by computer scientists from the University of California in San Diego, it was discovered that close to half of the number of Apple iOS applications have access to the unique identifier about the devices where they were downloaded. With that information, application vendors and advertising networks can determine the behavior of the users from variety of applications in their device, which includes iPads and iPhones. In fact, some apps have the power to associate the Continue Reading

Windows 8 Security Threat

Great power has its perks, but it also has a catch. In the case of Windows’ early versions, it may have indeed been considered as the most dominant operating system platform when it encouraged open development to developers. However, opening their system for developers to extend and build on Windows opened it to some serious security threats. Windows may have gotten the number one spot on the list of the world’s best operating systems, but since they allowed developers to practically do Continue Reading

Federal Reserve Infiltrated By Anonymous

A group of hackers who collectively call themselves as Anonymous has been involved in a string of security attacks on US Government Agencies. Recent victim of these attacks is the Federal Reserve website. From one of its internal website, personal Information of 4,000 US bank officials were reportedly stolen from its server. The hackers' publication has revealed information such as names, email addresses, contact numbers and even login credentials. The Federal Reserve has toned down the Continue Reading

Potential Security Risk with Transport Layer Security (TLS) Protocol

Internet applications like Facebook, online shopping and online banking are now part of our daily routine. To save time and minimize effort, most of our transactions or communications are done online. Most of us are enjoying the benefits of online activities but at the same time are also aware of the possible dangers that come with it. As much as we try to be responsible and careful, there will always be someone or something that would compromise the whole system. Let us take Transport Continue Reading

Botnet: A Lone Cyber Criminal’s Greatest Ally

When people hear the word "hacker", they generally associate it with the idea that they are all shadowy individuals that are brilliant with computers and try to break into government facilities on a daily basis. For the most part though, what many people would call "hackers" are just regular people like you and me. Alone, most hackers have a hard time with some malicious activities. It's extremely difficult to shut down a website on your own for example. This is why, in most cases, you don't Continue Reading

New York Times Hacked By The Chinese

Hackers from China reportedly broke into the system of The New York Times. This was after an article about the immense affluence of the relatives of Chinese Premier Wen Jiabao was published on October 25th, 2012. Consecutively, the Wall Street Journal also came out to report the same incident as well as Bloomberg. The New York Times was the first to write on the Chinese Premier's personal wealth which would be considered as controversial given the poverty rate in China. Many Chinese citizens Continue Reading

Red October Virus Explained

Rocra, which is short for Red October, was detected by Kaspersky. Kaspersky started to look into the malware last year in October. They found that a group of hackers were using exploits in order to steal information worldwide from high level departments. They also believe that the attacks have been occurring for over five years. How does it work? The malware operates by using exploits in Microsoft Word and Excel. The primary technique they hackers used is a form of phishing called Continue Reading

How Secure Is Skype?

Not long ago, the thought of using a voice over Internet protocol program to effectively communicate would have been surprising. Since the Internet has become more commonplace though, many people use Skype daily to stay in contact with people over a distance. Skype is also used by many businesses as well. With all that in mind though, how secure is Skype? Skype as a Target Malware authors are always trying to find more new ways to get infiltrate people's computers. Skype has become a Continue Reading

Google Android Malware Threat

Android is an ideal target for malware creators and spammers for a couple of reasons. First of all, Android has the largest market share among mobile phones. This means that when a malware writer creates a new piece of software, it will get the most exposure on the Android platform. Additionally, when compared to Microsoft's Windows phone or an iOS platform, the Android platform is much easier to work on. This is partially due to the amount of freedom developers are given for creating Continue Reading