AVG's Anti-Virus and Internet Security line follows up last year's highly ranked security suite with a stronger emphasis on personal data management and privacy utilities to prevent unwanted privacy breaches. Version 2014 not only maintains a consistently level rate of protection, but also includes a few new extra tools like File Shredder and Data Safe for a more permanent and secure solution to deleting files, as well as creating a safe box for files on your local machine.
Researchers have once again pulled a fast one on Apple's app approval process, getting malware onto the App Store to prove it's still a possibility.
A group of researchers from Georgia Tech developed an app that masqueraded as a news reader that would phone home to reprogram itself into malware -- something that was apparently not picked up in Apple's security screening procedures, reports the MIT Technology Review.
Once configured remotely, the software was able to do things like send texts, e-mails, post Tweets, take pictures, dial phone numbers, and even reboot the system.
Apple only ran … Read more
MMS version 3 adds several new features that include custom profile setups, improved analysis of data exposure, and backup operations over Wi-Fi. These updates come alongside Mobile Security's Basic free tier features, which come with mobile antivirus, anti-theft, and backup services. McAfee's mobile efforts focus on using both preventative and recovery measures during worst-case scenarios, with a Premium service that also comes with extra features.
According to Ari Jaaksi, McAfee's SVP of Mobile Engineering, "When consumers contemplate securing their smartphones and tablets, they often think in terms of their susceptibility to mobile malware, overlooking the very … Read more
While the National Security Agency has gotten most of the recent flak for spying on people via the Internet and cell phone records, the Federal Bureau of Investigation appears to be doing some cyber spying of its own.
According to a report by the Wall Street Journal, the FBI has been allegedly developing surveillance tools that work much like what hackers use to collect information on suspects -- including Trojans, spyware, and malware. Supposedly, the FBI created some of these tools internally, while others were purchased.
The FBI "hires people who have hacking skill, and they purchase tools that … Read more
Ransomware scams are nothing new to computer users; one one making the rounds attempts to disguise itself as an FBI cybercrime intervention for suspected nefarious activity. If you get stung by this scam (generally the fastest way is by using underground pirated software search engines and pornographic sites that redirect to the scam page, but even innocent image searches will get you there if you're not careful), the site will present a notice claiming to come from the FBI "Cyber Department." It states that the system's browser has been seized and recorded, and that the user … Read more
Government agencies across several countries are on the hit list of a targeted cyberattack, according to security vendor Trend Micro.
Officials at agencies across Europe and Asia have been receiving an e-mail that lists the Chinese Ministry of National Defense as the source, Trend Micro revealed on Monday. But in fact, the message seems to comes from a Gmail account and uses no Chinese name.
The e-mail itself is packed with a malicious attachment designed to exploit a weakness in all versions of Microsoft Office from 2003 through 2010. Microsoft actually patched this specific hole more than a year ago, … Read more
F-Secure is reporting that some new malware attempts in OS X are using a spoofing technique to disguise malicious installations as standard files. The technique involves using a special Unicode character in file names that will make an application appear to be a standard document file.
While applications can be renamed with ".doc" or ".pdf" extensions in the OS X Finder, the system will append the ".app" extension to show only the name has been altered and the file is still recognized as a program. This will happen even if you have the Finder … Read more
Android phones have come under attack from malware masquerading as Jay-Z's Magna Carta Holy Grail, targeting rap fans looking to get the album on their Samsung Galaxy phone.
Spotted by McAfee Mobile Security, the Android Trojan is hidden in a dodgy copy of the app for Jay-Z's latest album, which was released early to selected owners of the Samsung Galaxy S4, Galaxy S3 and Note 2.
On the surface, the fake app is identical to the real thing. But in the background, the malware sends data to an external server every time the phone restarts, and attempts to … Read more
Mobile malware creators and smartphone makers seem to be in a neck-and-neck software race, but new data shows that the malware creators could be taking the lead.
Juniper Networks released its third annual Mobile Threat Report on Tuesday and the findings aren't pretty. Mobile malware grew at a rate of 614 percent from March 2012 to March 2013 -- that's equal to 276,259 malicious apps floating around out there. Last year, the increase was a mere 155 percent.
The report is based on an analysis of more than 1.85 million mobile apps and vulnerabilities across major … Read more
Web sites you think are safe but have been compromised to distribute malicious software are far more prevalent than sites that are intentionally dangerous, according to a new Transparency Report from Google released on Tuesday.
The new Safe Browsing section of the report reveals some of the security trends that Google has been seeing. While Google reiterated that its Safe Browsing program flags up to 10,000 sites a day, the report showed that hacked sites remain a major problem -- with about 60 percent hosting malware and 40 percent being used for phishing attacks.
Dedicated attack sites numbered in … Read more