Select the directory option from the above "Directory" header!

"Exploits / vulnerabilities" news, interviews, and features

News about Exploits / vulnerabilities

  • Prison for four who ran credit card fraud market

    Four men who ran what U.K. police say was the largest English-language criminal forum for selling stolen credit card numbers and the tools to steal data were imprisoned for a combined total of more than 15 years, according to the Metropolitan Police.

  • Android Market spiked with malware-laced apps

    More than 50 applications containing malware have been discovered in Google's application market for its Android mobile OS, a sign that hackers are hard at work trying to compromise mobile devices.

  • Vulnerability management tools: Dos and don'ts

    <strong>DON'T shortchange remediation.</strong> Surprisingly, organizations will perform vulnerability scans, or hire someone to conduct a scan, get a report and then not follow through. They may cherry-pick one or two critical items and neglect the rest. The result is that the organization has spent time and money without doing much for its security.

  • 'Night Dragon' attacks from China strike energy companies

    Chinese hackers working regular business hours shifts stole sensitive intellectual property from energy companies for as long as four years using relatively unsophisticated intrusion methods in an operation dubbed "Night Dragon," according to a new report from security vendor McAfee.

  • Microsoft update offers an easier way to turn off autoruns

    Microsoft's latest round of patches released on Tuesday includes an optional update that will shut off the "autorun" capability for users of older Windows operating systems, a move the company has made to reflect the resurgence of worms carried on removable media.

  • ShmooCon: Eavesdropping easy on Evite

    Web service Evite offers more than a convenient way to send out e-mail invitations to events. For those with even a modest amount of malicious gumption, the site can also provide a treasure trove of personal information, at least according to one security researcher.

  • Carberp banking malware upgrades itself

    A piece of banking malware that researchers have been keeping an eye on is adding more sophisticated capabilities to stay hidden on victims' PCs, according to the vendor Seculert.

  • Coming soon: A new way to hack into your smartphone

    More than three years after the iPhone was first hacked, computer security experts think they've found a whole new way to break into mobile phones -- one that could become a big headache for Apple, or for smartphone makers using Google's Android software.