In the future, mobile phones are going to be among the top choices for hackers in hacking. Experts in a Georgia Tech say hackers can easily release malware onto guarded devices when they dock to sync or plug into USB ports to charge.
Considering the increasing breach of security in all mobile phones, Research in Motion, along with Pyxis mobile are to host a webinar on the 31st of August on mobile security issues. The program will be held at 1PM EDT. In addition to providing a bird’s eye view over all BlackBerry devices, the webinar will also Read more
Security researchers found out that a new malware that has the same feature as the Zeus malware is capable of turning an ordinary malware into a worm. Since both Zeus and SpyEye code can now be used by cyber-criminals, the world believes that there will be more hackers, who are going to attempt to steal financial and other data.
Any gadget that employees bring to his work might become the reason of serious infection for a company’s site. If IT has not prepared for the worse, then it might be subjected to attacks from Trojan and other malware, which want to infect and control your computer. The problem is far worse than people thinks Read more