Exploits / vulnerabilities - News, Features, and Slideshows

News

  • Cybercriminals selling exploit-as-a-service kit

    Cybercriminals are taking a page from the software-as-a-service playbook: they're now selling exploit kits complete with hosting services, with customers paying for the length of time the exploits are actively infecting computers.

  • SCADA vulnerabilities prompt US government warning

    A flurry of software vulnerabilities found in a variety of industrial control systems has prompted vendors to begin developing patches, following a warning by the U.S. government's Computer Emergency Readiness Team (CERT).

  • European agency warns of botnet dangers

    The battle against groups of hacked computers known as botnets is suffering from a lack of coordination, resulting in a cybercrime industry worth more than US$10 billion worldwide annually, according to a report from a European Union security agency.

  • After attacks, Google vows to fortify Android Market

    Google will build new safeguards into Android Market, its application store for the Android mobile OS, following an attack that infected thousands of phones and forced the company to wipe the malware remotely from phones, it said late Saturday.

  • Prison for four who ran credit card fraud market

    Four men who ran what U.K. police say was the largest English-language criminal forum for selling stolen credit card numbers and the tools to steal data were imprisoned for a combined total of more than 15 years, according to the Metropolitan Police.

  • Android Market spiked with malware-laced apps

    More than 50 applications containing malware have been discovered in Google's application market for its Android mobile OS, a sign that hackers are hard at work trying to compromise mobile devices.

  • Vulnerability management tools: Dos and don'ts

    <strong>DON'T shortchange remediation.</strong> Surprisingly, organizations will perform vulnerability scans, or hire someone to conduct a scan, get a report and then not follow through. They may cherry-pick one or two critical items and neglect the rest. The result is that the organization has spent time and money without doing much for its security.

[]