Quantcast
Channel: CyberInsecure.com » Software
Browsing all 20 articles
Browse latest View live

Locked iPhone Allows Passwords Theft And Decryption

German security researchers have demonstrated that passwords stored on a stolen or lost iPhone can be retrieved in around six minutes even if the device is locked. Researchers Jens Heider and Matthias...

View Article



Android Market Security Update Released By Google Contained Mobile Trojan

Chinese hackers are distributing a mobile trojan to users as a repackaged version of the Android Market security update released by Google last week. Repackaging legit Android apps with trojans is...

View Article

Apple Releases iOS 4.3 Security Update, Incompatible iPhone 3G Users Remain...

Apple is leaving some of its older mobile devices unprotected with its latest patch batch. An iOS 4.3 update, which includes a number of critical security fixes, is incompatible with the still widely...

View Article

Internet Explorer 9 Now Available To Download, Domain Dedicated To The...

Microsoft released version 9 of its Internet Explorer web browser. It can be can downloaded from windows.microsoft.com or from the Beauty of the Web site www.beautyoftheweb.com. Beautyoftheweb.com was...

View Article

RSA Servers Breached, SecurID Two-factor Authentication Tokens Data Stolen

Attackers breached the servers of RSA and stole information that could be used to compromise the security of two-factor authentication tokens used by 40 million employees to access sensitive corporate...

View Article


PHP.net Server Wiki.php.net Breached, Source Code Checked For Malicious...

Maintainers of the PHP programming language spent the past few days scouring their source code for malicious modifications after discovering the security of one of their servers had been breached. PHP...

View Article

Spotify.com Software Hit By Malicious Third-party Advertisements, Around 9...

Spotify users have fallen victim to a drive-by download attack instrumented via malicious ads displayed in the free version of the software. Spotify is a popular music streaming service with over 10...

View Article

MySQL.com Database Compromised Through SQL Injection, Localized Website...

Hackers have compromised the database of MySQL.com, as well as the French, German, Italian, Japenese and other localized versions of the website, ironically by exploiting an SQL injection...

View Article


Mass SQL Injection Attack Infects Over 28,000 Pages, Including iTunes Podcast

A new mass injection attack has infected over 28,000 pages and even made its way to iTunes according to security researchers from Websense. Dubbed LizaMoon, after the domain hosting the malicious code,...

View Article


Goal.com Parts Injected With Malware-Serving Code, Multiple Pages Including...

Security researchers from Armorize warn that attackers have managed to inject visitor infecting code into the popular soccer news website goal.com. The rogue iframe has been inserted, probably through...

View Article

Lockheed Martin Discovers Network Intrusion, Suspends Remote Access

Lockheed Martin has reportedly suspended remote access to email and corporate apps following the discover of a network intrusion that may be linked to the high-profile breach against RSA earlier this...

View Article

Microsoft Release Standalone System Sweeper, Bootable Malware Scanner For...

Microsoft is now providing customers with a standalone malware scanner running from bootable CDs, DVDs or USB drives, for use on systems that are infected with sophisticated threats. The tool, called...

View Article

Web Sessions Over Protected Wireless Networks Can Be Hijacked With An Android...

A new Android app makes hijacking other people’s Facebook, Twitter, YouTube and Amazon sessions a breeze over private or open wireless networks. Called FaceNiff, the app is the work of a Polish...

View Article


Preventing Email Vulnerabilities In The Business World

In the business world today, email has become one of the most heavily means of communication. It is quick and easy, files and ideas can be simply transferred between people in other parts of the world...

View Article

osCommerce Compromised Sites Distribute ZeuS Spin-off Trojan, Millions Of...

Security researchers warn that variants of a ZeuS spin-off trojan called Ice-IX are being distributed from osCommerce websites compromised during a recent mass injection attack. The attack targeting...

View Article


Unpatched Yahoo! Messenger Flaw Allows Status Updates Remote Hijacking

Security researchers have discovered an unpatched flaw in Yahoo! Messenger that allows miscreants to change any user’s status message. Hijacked status updates are a handy way to persuade a victim’s...

View Article

Software Offered By CNET Bundled With Trojans, Spread Through Download.com

One of the developers of a network exploration and security auditing tool called Nmap is accusing CNET of bundling free software with Trojans and shady toolbars, and serving them on their Download.com...

View Article


Scareware Makes Files And Folders Invisible, Demands Ransom For Repair Utility

Bitdefender experts came across a piece of scareware that makes victims believe that something may have happened to all the files and folders stored on their computers. The user is then requested to...

View Article

Free Malware Scanning Service SiteInspector Launched By Comodo

Security solutions provider Comodo released a free service called SiteInspector, designed to scan websites for pieces of malware and compare them against a range of blacklisting services, such as the...

View Article

Apple Plugs Java Hole After Flashback Trojan Creates 550,000 Strong Mac Botnet

Apple released a security update for OS X Java on Tuesday, plugging a security vulnerability exploited by the latest Flashback Trojan. The latest variant of the Mac-specific malware appeared on Monday...

View Article
Browsing all 20 articles
Browse latest View live


Latest Images