Mobile malware on the Android platform is on the rise.
Remember Symbian? Few people actually care about the mobile platform these days, and that's evidenced by the reduction of mobile malware aimed at Symbian, which dropped from 29 percent in 2011 to 19 percent in 2012, according F-Secure's latest Mobile Threat Report (PDF). Android, on the other hand, is more popular than it's ever been, and as a result, 79 percent of all mobile malware is targeted at Google's open source OS.
International think-tank Ethisphere named a number of tech firms in its list of World's Most Ethical (WME) companies for 2013.
Security firm Symantec has been named one of 2013's World's Most Ethical Companies by Ethisphere Institute, an international think-tank and supposedly the only provider of third-party verifications of compliance programs. Ethisphere's methodology includes reviewing codes of ethics, litigation, and regulatory infraction histories, along with evaluating the investment in innovation and sustainable business practices, among other criteria.
The newest version of Avast is better suited for touchscreen displays.
The march of technology is inevitable, and not just on the hardware side. As luck would have it, no sooner did we finish our annual antivirus roundup (look for it in the April issue of Maximum PC), Avast, one of the contenders, comes out with a new version. That's bound to happen when you're evaluating 10 different programs, but timing aside, here's what Avast 8 brings to the table.
Latest security bulletin addresses three vulnerabilities
February is proving to be a very busy month for those tasked with the unenviable task of plugging Flash Player holes at Adobe. The Adobe Product Security Incident Response Team (PSIRT) on Tuesday announced the availability of new security updates for the Flash Player. This is the third time this month that the company has had to release security updates for the ubiquitous plugin.
Hackers changed Burger King's Twitter account to look like McDonalds.
Perhaps, as one Twitter user commented, "Whopper123" isn't a secure password. Whatever password Burger King was using to lock down its Twitter account, hackers figured it out and promptly got to work with a McDonalds themed makeover. The cyber pranksters changed Burger King's Twitter handle and avatar, and posted a series of fake tweets, one of which claimed the fast food joint had been sold to McDonalds.
It's not just adults who write and distribute Trojans, pre-teen kids are doing it too, AVG says.
I'd like to think that most 11-year-old kids are into video games, comics, collecting baseball cards, watching Cartoon Network, and things of that nature. Hell, I still do most of those as an adult, but what I find hard to fathom is a handful of pre-teen kids are spending their free time writing malicious code. It's true, according to a report by security firm AVG, which notes that the code is usually written using the .NET framework.
Security firm discovers a pair of malicious apps in Google Play that try to exploit Windows' AutoRun feature.
Do you talk to your PC? If so, be careful what secrets you share with your system, you never know who might be listening. We're not being paranoid here, Security firm Kaspersky has discovered a pair of malicious programs in Google Play that are designed to infect PCs, where it then gets busy tapping into the audio system so that it can record the victim. The sound files are then sent to the malware's author. What's the point?
Popular networking standard places as many as 50 million IPs at risk of one of three attacks, researchers say.
Researchers at Rapid7, a provider of vulnerability management, compliance, and penetration testing solutions for web applications, network, and database security, warns that the popular Universal Plug and Play (UPnP) protocol is flawed, exposing tens of millions of network devices to at least one of three different types of attacks. More than 23 million Internet-connected devices are vulnerable to remote code execution through a single UDP packet, along with tens of millions more via remote discovery on the web.