AVAST recently surpassed a major milestone: More than 100 million downloads of avast! Mobile Security & Antivirus for Android. To celebrate the phenomenal popularity of avast! Mobile Security, we organized a test-your-knowledge quiz on our popular avast! Facebook page. Our goal was not only to test your knowledge and award participants, but also bring your […]
While V2V communications will enable a range of safety applications, securing the protocol will require a system of unprecedented complexity.
Read more…
While V2V communications will enable a range of safety applications, securing the protocol will require a system of unprecedented complexity.
Read more…
Días después de que se descubriera que algunas cuentas de celebridades en iCloud fueron comprometidas, Symantec identificó que una gran red de bots (botnet) está enfocándose en los clientes de Apple a través de una campaña de correos electrónicos de phishing que buscan atraer víctimas para robarles el ID y contraseña de su cuenta de Apple. Kelihos (también conocido como Waledac) es el nombre del código malicioso que está usándose para enviar correos de spam que parecen ser de Apple, en los cuales informan a la víctima que una compra ha sido realizada usando su cuenta de iTunes Store.
Dias depois da descoberta de que diversas celebridades tiveram suas contas no iCloud comprometidas, um grande botnet voltou sua atenção aos clientes da Apple e lançou uma campanha de phishing por e-mail. O objetivo é atrair as vítimas e fazer com que revelem seu ID da Apple e suas senhas. Symantec observou a ameaça Kelihos (também conhecido como Waledac) sendo utilizada em e-mails de spam, que alegam ser da Apple, informando à vítima que uma compra havia sido feita a partir de sua conta na iTunes Store.
Botnet targets Apple customers, launching phishing email campaign to lure victims into disclosing their Apple IDs and passwords.
Read more…
Compared to Windows users, Mac users have been relatively unaffected by malware attacks. Cybercrooks, however, are just as aware as antivirus vendors are about Mac vulnerabilities. With the growing number of Mac users, cybercrooks see more potential for malicious activities, especially as Mac users tend to have a false sense of security and not usesecurity software. You […]
Attempts to use encryption to make analysis of phishing websites more difficult may be a sign of things to come.
Read more…
詐欺師たちは、iCloud の侵害に関する話題や、さらに多くの写真や動画の流出に多くの関心が集まっていることに乗じて悪用しようとしています。
People expect that they are being watched online in cyberspace, but who would expect to be spied on by the people closest to them? You better watch out – your partner may be spying on you more than the NSA: One in five men and one in four women admitted to checking their partner’s smartphone […]