Malvertisements or malvertising are a malicious variety of online advertisements generally used to spread malware. However, that definition is somewhat dated as the term has evolved.
While it’s easy to call an ad that redirects to malware a malicious one, it is often hard to differentiate between fraudulent and legitimate online ads. For example, there are any number of legal online ads that any reasonable observer would characterize as malicious or fraudulent. On the other hand, there are likely benign ads that are flagged by some advertising networks as malicious or fraudulent on superficially technical grounds.
Read moreThe Argentine government has used drones to catch out wealthy tax evaders who had not declared mansions and swimming pools. Unmanned aircraft were dispatched over an upper class area of Buenos Aires and discovered 200 homes and 100 pools that had not been detailed on returns.
Tax officials said the drones took pictures of luxury houses standing on lots registered as empty. Use of drones has been expanding in Argentina and the rest of South America with the unmanned vehicles being deployed for purposes as diverse as locating drug smuggling routes, monitoring farm crops, and looking for archaeological sites.
Read moreInventors of surveillance systems reported to authorities that it is possible to track absolutely any user who has a mobile phone, and the location of a person is not important, it doesn’t matter whether he is near or in another country.
The most famous intelligence services around the world, such as the National Security Agency of the USA and The Government Communications Headquarters of the United Kingdom use information from mobile phones for a long time. However, due to the new systems in countries that are less developed technically, it is possible to track people around the world easily. How does the system work?
Read morePhishing attacks are by far the most popular form of cybercrime in the 21st century. The media regularly reports lists of organizations whose customers fell victim to phishing attacks. Phishing scams increase in quality and quantity every day.
Whereas spam tends to be merely an annoying distraction, phishing frequently leads to real financial losses. If the threat is so real, why don’t people learn to avoid it? There are numerous reasons why phishing works so well, starting with the ability of the scammers to play mind tricks on victims, in order to lure them into trouble. Phishers can use tempting offers, like complimentary giveaways, in order to bait users.
Read moreWith a bug as dangerous as the “shellshock” security vulnerability discovered yesterday, it takes less than 24 hours to go from proof-of-concept to pandemic. The shellshock attacks are being used to infect thousands of machines with malware designed to make them part of a botnet of computers that obey hackers’ commands.
And in at least one case the hijacked machines are already launching distributed denial of service attacks that flood victims with junk traffic, according to security researchers. The attack is simple enough that it allows even unskilled hackers to easily piece together existing code to take control of target machines.
Read moreThe search engine that protects your privacy by not tracking your searches has been blocked in China. DuckDuckGo has garnered kudos among privacy advocates because it allows you to search for items on the Web anonymously.
Unlike Google and other search engines, the site doesn't collect personal information, so it cannot share any data about you with law enforcement or other authorities. In addition to its core website, the company also offers mobile apps for iOS and Android users. Search engines face unique challenges in trying to carve out business in China where the government demands that certain information be blocked from its citizens.
Read moreJulian Assange has transcended the confinement of his Ecuadorian embassy asylum to attend the 2014 Nantucket Project – as a hologram. In his ghostly entirety Assange was speaking about censorship, control and manipulation of history.
Speaking with filmmaker Eugene Jarecki, Assange closed the 2014 event, sharing his thoughts on importance of research and free access to information, and risks of censorship. “As a researcher, I'm all too well aware of what people are now calling Google blindness, that the information you can’t find on the Internet doesn’t exist,” Assange said, not missing a chance to take on the corporation and call it a “revolving door” of NSA and close partner of the US Government.
Read moreAccording to the research it was found that one in four installed applications is really safe and corresponds to all standards of data security. Gartner experts report that this situation will remain till at least 2015.
All companies should be on the alert, it is necessary to check the installed applications with special programs in order to avoid dangerous situations and data leaks. According to Gartner, in 2014 users around the world have installed about 139 billion applications on their devices, but in 2017 their number will be increased significantly.
Read moreProsecutors of the USA indicted a Pakistani man for marketing a StealthGenie application that could be used to secretly spy on calls, texts, and other activity on smartphones.
Charges leveled against were billed by the US Department of Justice as the first-ever criminal case centered on the advertisement and sale of an app tailored to spy on smartphones. Assistant attorney general Leslie Caldwell of the Justice Department criminal division thinks that selling spyware is not just reprehensible, it's a crime.
Read moreA lot of people can be surprised that Steve Jobs forbid his kids from using new devices, including those that he created. During the interview Steve said: "My children haven't used it. We limit how much technology our kids use at home." It is strange to hear from the person who made devices that dictate fashion and identify trends.
It turns out that many other leaders of technology firms strictly limit the amount of time their children can spend in front of a screen. Many people didn’t know what to say about Jobs‘ answer. They somehow thought that his house is full of touch screens, but iPads and iPhones are given to guests instead of candies. But it was not so. At all.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland