Windows Registry-infecting malware has no files, survives reboots

Monday, August 4th, 2014

Researchers have detailed a rare form of Windows malware that maintains infection on machines and steals data without installing files. The malware resides in the computer registry only and is therefore not easy to detect. It code reaches machines through a malicious Microsoft Word document before creating a hidden encoded autostart registry ...

Sandwich Chain Jimmy John’s Investigating Breach Claims

Thursday, July 31st, 2014

Sources at a growing number of financial institutions in the United States say they are tracking a pattern of fraud that indicates nationwide sandwich chain Jimmy John’s may be the latest retailer dealing with a breach involving customer credit card data. The company says it is working with authorities on ...

Massive, undetectable security flaw found in USB: It’s time to get your PS/2 keyboard out of the cupboard

Thursday, July 31st, 2014

Security researchers have found a fundamental flaw that could affect billions of USB devices. This flaw is so serious that, now that it has been revealed, you probably shouldn’t plug a USB device into your computer ever again. There are no known effective defenses against this variety of USB attack, though ...

AV engines are riddled with exploitable bugs

Tuesday, July 29th, 2014

A security researcher has found a great number of exploitable vulnerabilities in popular security solutions and the AV engines they use, proving not only that AV engines are as vulnerable to zero day attacks as the applications they try to protect, but can also lower the operating system's exploit mitigations. "Installing ...

Apple “inadvertently admitted” to iOS backdoor: forensics expert

Wednesday, July 23rd, 2014

Apple has "inadvertently admitted" to creating a "backdoor" in iOS, according to a new post by a forensics scientist, iOS author and former hacker, who this week created a stir when he posted a presentation laying out his case. Apple has created "several services and mechanisms" that let Apple -- and, ...