- News tagged "security"
Friday, 13 Jul 2012
Norton has released a survey which sheds light on Singaporeans' mobile usage habits, the importance of personal information, and their level of understanding when it comes to mobile security.
Yahoo has formally confirmed that the Yahoo Voices data breach did come from its servers, and that "approximately" 400,000 email addresses and passwords have been compromised in plain text online.
According to Symantec, a new Android.Dropdialer Trojan was found masquerading as two popular game titles on the Google Play store. Since their appearances on Google Play on June 24, they’ve raked in 50,000 to 100,000 downloads.
Thursday, 12 Jul 2012
In a security advisory released yesterday, Microsoft advised Windows 7 and Vista users to disable their Windows Sidebar and Gadgets. The company warned that insecure gadgets could be used to run arbitrary code on a computer. Read on to find out how to secure your affected system.
Monday, 9 Jul 2012
This malicious app sends SMS messages to specific numbers, incurring unnecessary charges and although these fake Skype apps are marketed specifically to Android users, the malicious .JAR file can be executed on pre-Software Installation Script (SIS) Symbian phones or certain versions of Android which run Java MIDlet too.
Thursday, 5 Jul 2012
IMS.cloud is designed to scan every IM sent to or coming from an organization. Incoming messages, including attachments, are scanned for viruses, worms, and URLs which may lead to malicious websites.
Friday, 29 Jun 2012
ESET has uncovered a worm that targets AutoCAD drawings. Upon infection, the worm - ACAD/Medre.A - will proceed to steal files and send them to email accounts in China.
Wednesday, 13 Jun 2012
Symantec will extend its Storage Foundation High Availability for Windows and Veritas Volume replicator DR (disaster recovery) software solution to the Windows Azure cloud platform.
Wednesday, 30 May 2012
An unpatched exploit that affects Windows 7, Windows Server 2008 R2 and Windows 8 Consumer Preview allows a user to launch a system shell by manipulating the sticky keys function. This hack is straightforward to implement as it can be executed in a matter of minutes.
Tuesday, 15 May 2012
Allowing SMBs to enjoy reliable and secure off-site data protection, the solution is the first in the region to provide a fully managed and monitored backup service featuring both on-site and off-site backup, via a dedicated link.