NK hackers target Mac users with trojan cryptocurrency app
Fake app and fake company, but legitimate digital certificates.
Fake app and fake company, but legitimate digital certificates.
IBM details a well-established banking trojan's move to cryptocurrency exchanges.
Security researchers and law enforcement can now use Shodan to search for malware servers that are used to control infected computers.
The Australian government has had a mixed bag of outcomes this year around cybersecurity, with many lauding its leadership in the area
David Braue | 29 Aug | Read more
As the Rio Olympics neared the opening ceremony, cybercriminals were also lacing up their running shoes with the establishment of many malicious domains and servers in Brazil. Real-world crime was also a risk, with warnings that stealing payment-card data is easy and an inexpensive bit of electronics able to hack hotel room locks and point-of-sale systems.
David Braue | 08 Aug | Read more
Former Apple Macintosh evangelist Guy Kawasaki posts Twitter messages about a lot of different things, but the message he put up on Tuesday afternoon was really out of character.
Robert McMillan | 24 Jun | Read more
In this white paper we will: • Summarize the decline of Phishing 1.0. • Discuss how phishing has turned toward business and become more costly. • Outline the structure of new Phishing 2.0 attacks. • Delineate how the new campaigns evade standard antiphishing countermeasures. • Describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.