Author Archives: Hacker Medic

Phishers Ensuring Social Security with Fake Apps

Contributor: Avdhoot Patil
As usual, phishers continue to focus on social networking as a platform for their phishing activities. Fake social networking applications on phishing sites are not uncommon. Phishers continue to come up with new fake applica…

Preparing Your Online Business for Mobile – Focus On: Security

As more and more consumers and organizations alike rely on smartphones for everyday activities, having a functioning and secure mobile site is going to be even more important for retailers today. However, the bounce rates and low conversions for mobile sites still stand in the way of mCommerce becoming a viable channel for most online Read more…

Tap Your Tech to Chase Off Summer Boredom

Summer is here and with it comes that foreboding stretch of empty highway parents call summer break. Sure, it’s peppered with sun and fun, snow cones, a vacation perhaps, but then—sometime into the third week—comes the notorious whine “I’m boooooored!” Relax, technology is on your side during those long days, parents. So fire up your Read more…

Download with Caution! McAfee Identifies Risky Mobile App Sources

As more people use mobile devices in their daily lives, those devices are rendering them increasingly vulnerable to infection through the very apps we rely on to make our lives easier. According to McAfee’s recent report, “Mobile Security: McAfee Consumer Trends Report – June 2013”, malware threats have not only increased for mobile devices, but Read more…

Norton Mobile Insight Discovers Facebook Privacy Leak

Today we released a new version of Norton Mobile Security for Android devices that contains our new Norton Mobile Insight technology. Mobile Insight has analyzed over 4 million Android applications and processes tens of thousands of new applications ev…

Four Years of DarkSeoul Cyberattacks Against South Korea Continue on Anniversary of Korean War

Yesterday, June 25, the Korean peninsula observed a series of cyberattacks coinciding with the 63rd anniversary of the start of the Korean War. While multiple attacks were conducted by multiple perpetrators, one of the distributed denial-of-service (DD…

Styx Exploit Kit Takes Advantage of Vulnerabilities

Web-based malware has increased over the last few years due to an abrupt spike in new exploit kits. These kits target vulnerabilities in popular applications and provide an effective way for cybercriminals to distribute malware. We have already discussed Red Kit, a common exploit kit. Recently McAfee Labs has observed an increase in the prevalence Read more…

Chrome Web Store Apps Now Automatically Scanned

Google has started to scan newly uploaded applications and extensions in its Chrome Web Store, similar to what they already do in the Android Play Market.
We have written about quite a few cases where malicious extensions were pushed on social network …

The Risk with Content Management Systems

The federal Office for Information Security in Germany (BSI) together with the “Fraunhofer SIT” and “]init[ AG” released a study on the risk with common content management systems (CMS) for websites. A CMS is typically used to a…

Are You Stressed Out About Passwords? Consider a Simple Option

Used correctly, passwords help keep your personal information safe, and if you’re like me, you probably have dozens (or in my case hundreds) of online accounts and mobile apps that require one. So it’s no surprise that people have adapted some coping strategies to make passwords memorable yet distinctive. The most common mistake consumers made, Read more…