| | | | Security Watch June 26, 2013 | | | | TOP STORIES US, Russia to Share Cyber-Security Data to Defend Critical Systems, Avoid Cyber-War The United States and Russia will exchange cyber-threat data as part of an information-sharing program to increase cooperation between the two countries on cyber-security issues. Share This: Fake Antivirus Holds Android Phones for Ransom Fake Antivirus programs that run under Windows look just as good as real, valid antivirus tools. They'll run a scan for free--a fast one, since there's no actual scanning going on. However, to remove the imaginary malware found by the scan, you'll have to pay up. In a recent blog post, Symantec researcher Joji Hamada reported that this type of malware has come to Android, and it's even more aggressive than the typical Windows fake antivirus. Share This: An Open Letter to Yahoo Users Spamming My Account Hey, you. Yeah, you, the one with the @yahoo.com address. Stop clicking on links inside email messages, okay? You know those strange emails you've received from your friends the past week? The ones with nothing in the message, except for a link to some site you've never heard of? It's not some exciting or cool site your friend wants to see, I promise. Share This: Mobile Threat Monday: Children's Games Harvesting Data Dangerous Android apps aren't always the ones that infect user mobile devices with malware, or the ones that signs you up for rogue services you don't want. The apps that expose personal data are just as risky, and this week's list looks at apps that expose user data without explicit consent. Share This: Bitdefender Tops AV-Test's Latest Android Security Review Earlier this week, AV-Test released the latest results in its continuing look at Android security. Only three apps failed to get certified, and the average detection rate of all the apps jumped up to 96 percent. Despite the close competition, Bitdefender Mobile Security came out on top. Share This: Researchers Crack iOS Personal Hotspot Passwords If you use Personal Hotspot on the iPhone to set up a wireless access point, remember to generate your own passphrase instead of relying on the auto-generated passphrase. Share This: Review: Dashlane 2.0 Dashlane 2.0 is better than ever, with automatic form field capture, security breach alerts, secure sharing of login credentials, and a new browser extension for Firefox and Chrome (but not for Internet Explorer). Share This: Questions, comments, tips about potential viruses, worms, vulnerabilities? Send them here: | Featured Research | | | | Unified Mobility Download this white paper to learn what it takes to create a Unified Network for the Mobile Era. | | | | | Business Case for ERP Making the Business Case for Enterprise Resource Planning (ERP) | | | | | Uncomplicated BI Uncomplicating Business Intelligence for SMBs | | | | AWARD-WINNING TECH now on sale! |
| | | eNewsletter Information You are subscribed to PCMag.com's Security Watch with the email address pctipworld@gmail.com. Click here to unsubscribe from this newsletter. To subscribe to other e-mail newsletters from Ziff Davis, change your delivery format from HTML to text, or change your email address, click here. Copyright ©2013 Ziff Davis, Inc. All Rights Reserved. Ziff Davis, Inc., 28 East 28th Street, 11th Floor, New York, NY 10016 | |
ไม่มีความคิดเห็น:
แสดงความคิดเห็น