malware | TechWell

malware

Tester holding black Android smartphone Detecting and Preventing Android Security Risks

Even though the Android app development process involves thorough verification, there has been no preventing new malware from being developed. Here are some of the most common potential security risks Android users should watch out for, as well as some measures to take to protect your smartphone, data, and privacy.

Harshal Shah's picture
Harshal Shah
magnifying glass looking at code Google: How Online Accounts Are Hijacked

Hijacking accounts is one of the top online security threats, with billions of usernames and passwords from different platforms available on black markets. To understand how hijackers steal passwords and other sensitive data, Google partnered with UC Berkeley in a study of Google accounts.

Pamela Rentz's picture
Pamela Rentz
The Potential for DevOps in Fighting Cyber Warfare

Government hacking incidents have put cyber warfare in the news. DevOps actually presents an interesting arsenal. With DevOps, your systems have excellent environment monitoring and are cryptographically verifiable such that the slightest penetration or unauthorized change is immediately detected.

Bob Aiello's picture
Bob Aiello
With More Technology Comes More Malware

As technology has become more embedded within our lives, so have the attempts to infect and harm our use of that technology. In the past two years, more malware has been reported and detected than the combined yield of the last ten years. Read on for some alarming stats.

Cameron Philipp-Edmonds's picture
Cameron Philipp...
Doing Our Part to Contain Point-of-Sale Data Theft

It’s easy for us as software developers and testers to dismiss intrusions on point-of-sale systems as the fault of network security professionals or inadequate network defenses. The reality is that there is a lot we should be doing as well on the software side to prevent these kinds of attacks.

Jennifer Bonine's picture
Jennifer Bonine
Is It Time for Cloud Providers to Control Malware Distribution?

A recent Quarterly Threat Intelligence Report by Solutionary has revealed some alarming numbers about malware distributors and their hosting providers. Rajini Padmanaban looks at whether hosting providers are proactively rooting out malware or if they may actually be a part of the problem.

Rajini  Padmanaban's picture
Rajini Padmanaban
New Malware Prototype Doesn't Need Internet Access to Run Amok

Researchers in Germany have discovered a new way to transmit information between computers infected with a proof-of-concept malware prototype that does not need to be connected to the Internet to run amok. All it needs is access to a computer's microphone and speakers.

Jonathan Vanian's picture
Jonathan Vanian
US Government Says Android Mobile OS Is Top Malware Target

When it comes to malware attacks, there is one mobile operating system—Android—that walks away with the dubious honor of being recognized as the number one target by two US security agencies. Pamela Rentz provides details about the report released by the DHS and the FBI.

Pamela Rentz's picture
Pamela Rentz