Check out the latest business IT News.
A few low-end Android phones have been found to be infected with the Triada Trojan, according to the Russian Cybersecurity firm, Dr. Web, which discovered a variant of the malware lurking inside the Android OS Zygote core process. In this instance, the likeliest point of insertion was via a third-party vendor, somewhere in the phone…
Read MoreDespite getting off to a somewhat rocky start, USB Type-C cables have been a boon to computer users everywhere by providing bidirectional transfer capabilities, which essentially gives Type-C cables two “lanes” to work with. The USB 3.0 Promoter Group recently announced that things are about to get even better and faster when they released the…
Read MoreSeveral tech giants have plans in the works to expand the number of people who have access to broadband. Google’s plan would use a series of low-orbit satellites to beam wireless signal all over the globe. Facebook has plans on the drawing board that involve gliders. Microsoft’s plan is a bit different, involving the “white…
Read MoreThe third-party Chrome extension Copyfish recently got hacked. As a result, the hackers were able to inject malicious JavaScript code into the code base and use it to display ads on all the pages users who had the extension installed viewed. It took Copyfish’s developers a full day to realize they had been breached, and…
Read MoreOne of the most dangerous forms of banking malware, dubbed “Svpeng,” has recently gotten an upgrade that makes it even more troubling, this, according to researchers at Kaspersky Labs. The upgrade adds a new keylogging feature that allows the malicious software to track and log each keystroke, sending it back to the hackers at whatever…
Read MoreSmart devices are coming under increasing scrutiny. Why, you ask? Very few of them have any security at all, and the ones that do tend to have only the most rudimentary security protocols in place, which presents almost no challenge to even a novice hacker. As such, they’re the perfect attack vehicle. You’ve probably heard…
Read MorePatrick Wardle is a name you may not be familiar with, but if you’re a Mac user, it’s a name you need to know. He’s an ex-NSA hacker chief and is now the chief security researcher for Synack, and over the past few months, he’s been hot on the trail of an incredibly elusive bit…
Read MoreRumors of Microsoft Paint’s death have been wildly exaggerated. Recently, Microsoft announced the end of an era with the decision to remove paint from Windows 10, replacing it with the more modern Paint 3D. Then, something unexpected happened. The cumbersome, barely functional art program received such a strong outpouring of support that Microsoft reversed its…
Read MoreTrouble continues to brew where the IoT (Internet of Things) is concerned. Recently, the Internet Crime Complaint Center (IC3), which is a division of the FBI, has issued a warning to parents about the potential dangers that “smart” toys pose. The warning comes on the heels of a number of reports to the IC3 about…
Read MoreFile this report away under “how not to respond to a data breach.” Yes, it has happened again, and this time, to the financial giant, Dow Jones & Company. The UpGuard Cyber Risk Team discovered a cloud-based file repository controlled by the company that had been misconfigured, allowing semi-public access to it. The repository was…
Read More