How to Hack an iPhone With a USB Charger

Monday, June 3rd, 2013

When it comes to threats to mobile devices, most people don't think of chargers as a likely point of attack. But plugging in an iPhone — or any smartphone or tablet — could come at a price. At next month's Black Hat security conference in Las Vegas, three Georgia Institute of ...

New Malware Can Bypass BIOS Security

Saturday, May 25th, 2013

As more hardware vendors seek to implement the new NIST 800-155 specification that was designed to make the start-up BIOS firmware on our PCs and laptops more secure, they may need to rethink the security assumptions upon which the standard depends. A trio of researchers from The MITRE Corp. say ...

Internet Explorer 10 blocks more malware than Chrome or Firefox, test finds

Wednesday, May 15th, 2013

Microsoft’s Internet Explorer 10 is better at blocking malware downloads than rivals Chrome, Firefox, Safari and Opera thanks to superior URL and application reputation technology, a new test by NSS Labs has found. Browser security has been getting more and more layered and complex.  How it works and whether it works ...

AutoIT makes malware “outrageously easy”

Tuesday, May 7th, 2013

Security firm Trend Micro has seen an uptick in AutoIT-based malware thanks to the fact that it’s an easy-to-learn language that allows for quick development. It enables everything from simple scripts that change text files to scripts that perform mass downloads with complex GUIs. One commonly seen nefarious AutoIT tool ...

Malwarebytes backup service prevents malware uploads

Tuesday, May 7th, 2013

Your hard drive crashes. You hit “Save” without thinking and an important version is overwritten and lost forever. Someone accidentally deletes all the wedding pics. You restore an infected file to your new computer and end up having to start all over again. Stuff happens. Having a backup is a good idea. ...