Stagefright vulnerabilities pose serious threat to Android users
Although Google immediately patched seven critical vulnerabilities, how quickly end users receive updates is dependent on device manufacturers.Read More
View ArticleThe dawn of ransomwear: How ransomware could move to wearable devices
Symantec takes an in-depth look at ransomware to see where it could go next. Our research found that smartwatches could be on the ransomware shortlist.Read More
View ArticleFirefox vulnerability could allow attackers to steal documents
Symantec advises users to update their browser immediately.Read More
View ArticleMicrosoft Patch Tuesday – August 2015
This month the vendor is releasing 14 bulletins covering a total of 52 vulnerabilities. Twenty-two of this month's issues are rated ’Critical’.Read More
View ArticleFacebook comments on Buzzfeed, ESPN, and Huffington Post lead to technical...
Scammers promote links to free movies that lead to technical support scams for Windows, Mac OS X, and mobile users.Read More
View ArticleIs it time to start worrying about car hacking?
Every week brings a new story about a potential vehicle security vulnerability. Should drivers be concerned and how can they protect themselves?Read More
View ArticleNew Mac OS X vulnerability could provide attackers with root access
Symantec confirms existence of flaw, which requires victim to voluntarily run an application for exploit.Read More
View ArticleRemote code execution vulnerability in Internet Explorer patched
Symantec advises users to use Windows Update or the Microsoft Download Center to protect against CVE-2015-2502.Read More
View ArticleNew Internet Explorer zero-day exploited in Hong Kong attacks
Bug patched by Microsoft yesterday (CVE-2015-2502) has already been exploited in watering hole attacks to deliver Korplug malware.Read More
View ArticleAndroid ransomware: Tricks of the trade
A look at some of the detection-evasion and anti-analysis tactics employed by Android ransomware.Read More
View ArticleSundown exploit kit adds Internet Explorer exploit before any other kit
The Sundown exploit kit has been the first to integrate an exploit for the CVE 2015-2444 bug, using it in a recent watering-hole attack.Read More
View ArticleRegin: Further unravelling the mysteries of a cyberespionage threat
Symantec’s investigation uncovers additional modules for the Regin spying tool and finds advanced infrastructure supporting it.Read More
View ArticleScammers quick to capitalize on Ashley Madison breach
Symantec telemetry shows surge in spam messages mentioning Ashley Madison megabreach.Read More
View ArticleJailbreak iOS Trojan KeyRaider used as part of free apps scam
Attackers claim to offer premium apps to iOS devices for free by using stolen Apple ID accounts.Read More
View ArticleMicrosoft Patch Tuesday – September 2015
This month the vendor is releasing 12 bulletins covering a total of 52 vulnerabilities. Twenty of this month's issues are rated 'Critical'.Read More
View ArticleTop tips to secure your new iPhone
Security advice on how to keep your Apple iDevice, and the data stored on it, safe.Read More
View ArticleAndroid Marshmallow will not go soft on mobile ransomware
Recent updates in the upcoming Android 6.0, a.k.a. Marshmallow, will challenge mobile ransomware’s ability to lock screens.Read More
View ArticleAirDrop vulnerability poses threat to iPhone and Mac users
Apple users advised to update iOS and Mac OS X as successful exploit requires no user interaction.Read More
View ArticleFree Instagram followers: Compromised accounts, phishing sites and survey scams
Scammers are using compromised Instagram accounts to phish for login credentials and earn money through survey scams.Read More
View ArticleKovter malware learns from Poweliks with persistent fileless registry update
A variant of the Kovter malware is the first to use Trojan.Poweliks’ pioneering tricks by residing only in the registry to evade detection.Read More
View Article