Apache Goes To Hadoop Clusters
With Spark certified as YARN-ready, enterprise customers will be able to run memory and CPU-intensive Spark applications alongside other workloads on a Hadoop cluster, rather than having to deploy them...
View ArticleSelf-propagating SMS Worm Targeting Android Devices
A rare Android worm that propagates itself to other users by way of links in text messages has been discovered by security researchers. Once installed on a device, the malware, which was dubbed...
View ArticleFacebook Takes On Lecpetex Spam Botnet
Facebook said police in Greece made two arrests last week in connection with a little-known spamming botnet called “Lecpetex,” which used hacked computers look for the Litecoin virtual currency. As...
View ArticleZeus Is Back With A Vengence
Temporarily shut down the Gameover Zeus botnet, which was estimated to have enslaved between 500,000 to one million computers at its peak in June.
View ArticleWill Google’s Project Zero Succeed?
Regardless of what the directive is being called, courts technically didn't grant Europeans the right to be forgotten. Rather, it gave them the right to be relatively obscured, by having eligible pages...
View ArticleNearly 1M Fake Apps Are Targeting Your Mobile Devices
Fake apps purposely masked to look like official ones but actually designed to steal user data are increasingly targeting Android phone users, according to a study by Trend Micro. The company looked at...
View ArticleAre Governments Doing Enough To Warn People On The Risk of Cybercrime?
Kaspersky's roundtable took place as part of the firm's launch of a report that found small businesses in the UK are "woefully unprepared" for an IT security breach, despite relying increasingly on...
View ArticleResearchers Warn USB Devices Can Be Used In New Hacking Schemes
USB devices such as mice, keyboards and thumb-drives may be used to hack into personal computers in a potential new class of attacks that evade all known security protections, a top computer researcher...
View ArticleExperts Calling On The Government To Act Against Cyber Threats
Alarmed by the frequency of cyber threats around the world and across industries, a growing number of security experts see aggressive government action as the best hope for averting disaster. Even...
View ArticleStudy Finds Firmware Vulnerable To Hacking
The first massive analysis of a fundamental type of software known as firmware has unveiled poor security practices that could present opportunities for hackers probing the “Internet of Things.”...
View ArticleAMD Demos Hadoop On ARM
The chip in question is of course an A-series Opteron. AMD recently announced the Opteron A1100 and it is the company’s first ARM-based server part.
View ArticleStates Fret Over Ability To Hire Info Security Pros
States’ attempts to beef up cybersecurity are being hindered by lack of money and people. States don’t have enough funding to keep up with the increasing sophistication of the threats, and can’t match...
View ArticleKaspersky Working To Thwart Tyupkin ATM Malware
In June of this year, two Canadian teenagers showed how they had broken into an in-store ATM simply by downloading the instructions from the internet and using unchanged default passwords.
View ArticleSymantec Exploring Possibility Of Splitting Business Up
Security software maker Symantec Corp is in advanced negotiations to split its business into two entities – one that sells security programs and another that does data storage, Bloomberg reported,...
View ArticleDell Launches New SuperMassive 9800 Firewall
The Bash bug, as implied by its name, is a vulnerability that allows unscrupulous users to take control of Bourne Again Shell (Bash), the software used to control the Unix command prompt on some...
View ArticleSymantec Uncovers Advanced Spying Malware
An advanced malicious software application has been discovered that since 2008 was used to spy on private companies, governments, research institutes and individuals in 10 countries, anti virus...
View ArticleSony Pictures Still Struggling After Cyber Attack
More than a week after a massive cyber attack on Sony Pictures Entertainment, the Hollywood studio isstill struggling to restore some systems as investigators searched for evidence to identify the...
View ArticleYet Another Retailer System Hacked
Women’s clothing retailer Bebe Stores has become the latest in a growing list of national retailers to be hit by an attack on its credit card payment system. The company said Friday that the cardholder...
View ArticleSoakSoak Infiltrates WordPress Websites
We as a team would like to apologize officially to our clients for the problems that arose due to the security exploit in Revolution Slider Plugin versions older than 4.2, ? it says on its website.
View ArticleManufacturer Coolpad Has Built Backdoor Into Android Devices
Chinese smartphone maker Coolpad has created an extensive “backdoor” into its Android devices that can track users, serve them unwanted advertisements and install unauthorized apps, a U.S. security...
View Article
More Pages to Explore .....