| | | | Security Watch May 29, 2013 | | | | TOP STORIES Chinese Cyber Espionage: Don't Believe the Hype The Washington Post published a shocking list of U.S. defense programs whose designs have reportedly been stolen by Chinese cyberattacks and ABC news said the plans for Australia's spy headquarters were also stolen by Chinese hackers. It makes China sound like a secret-sucking cyber espionage machine, but is that really the case? Share This: How to Hack Twitter's Two-Factor Authentication We've pointed out some problems with Twitter's new two-factor authentication. However, security experts indicate that the problem is worse than that, a lot worse. Share This: Twitter's Two-Factor Authentication Can't Stop Account Hijackings Twitter is finally addressing thorny problem of account hijackings by rolling out two-factor authentication for all users. While a necessary first step, this is not sufficient to foil all the hijackers. Share This: Malware-splosion: 2013 Will be Malware's Biggest Year Ever According to the German security company AV-Test, malware has exploded in the past five years to unprecedented levels. More troublingly, they anticipate seeing over 60 million new pieces of malicious software by the end of the year. Share This: Iranian Cyber-Attackers Target US Energy Companies Cyber-attackers backed by the Iranian government have breached and infiltrated several US-based energy companies in an ongoing campaign, according to the Wall Street Journal. Share This: Zeus Trojan Makes a Comeback After Months of Silence The Zeus banking Trojan is back, with new code and capabilities, Trend Micro researchers said recently. Share This: Malware, Adware in This Week's Dangerous Android Apps Bad Android apps can take many forms. Whether they are out to steal data, sign you up for premium rate SMS services, or pushing dodgy and malicious links via advertiser networks, users need to beware. SecurityWatch is partnering with a handful of security companies who monitor apps on Google Play and third-party marketplaces to identify malicious apps you should avoid. Share This: Questions, comments, tips about potential viruses, worms, vulnerabilities? Send them here: FEATURED OFFERS | | AWARD-WINNING TECH now on sale! |
| | | eNewsletter Information You are subscribed to PCMag.com's Security Watch with the email address pctipworld@gmail.com. Click here to unsubscribe from this newsletter. To subscribe to other e-mail newsletters from Ziff Davis, change your delivery format from HTML to text, or change your email address, click here. Copyright ©2013 Ziff Davis, Inc. All Rights Reserved. Ziff Davis, Inc., 28 East 28th Street, 11th Floor, New York, NY 10016 | |
ไม่มีความคิดเห็น:
แสดงความคิดเห็น