John P. Mello Jr.PCWorld

Karma hotspot

Karma Hotspot review: A mobile data plan with no-nonsense pricing

This genuine pay-as-you-go data suffers from limited coverage.

shutterstock ransomware man pointing gun out of computer

'Perfect' ransomware is the scariest threat to your PC

Ransomware with unbreakable encryption will attract cyber bandits like bees to honey. This is far worse than just malware.

Smart spear phishing could kill the power grid, experts warn

While the energy industry may fear the appearance of another Stuxnet on the systems they use to keep oil and gas flowing and the electric grid powered, an equally devastating attack could come from a much more mundane source: phishing.

security

Hackers target social media, step up mobile attacks

Hackers are exploiting the lack of security basics among social media, mobile devices and even in business, reports an IBM X-Force analysis

Beware Android Trojans hitching a ride on botnets

Obad malware grows through zombie net, while Hesperbot takes a new tack on banking malware

on techhive.com

trojan horse

Trojan entices Craigslist users with fake software freebie

A malicious app is apparently being used to distribute mobile spyware on the popular via the free classifieds site.

Microsoft Office 2003

Office 2003's burial will resurrect hacker activity

The end of Microsoft's support for popular suite come April 2014 will usher in an era of 'infinite zero-day' attacks, analyst predicts

Mobile users rely on simple security methods, report says

With IT not requiring safer pass codes and device usability a factor, finding of 80 percent of users choosing convenience not surprising

on techhive.com

security

Password thieves target blogs, content management sites

Hackers are increasingly turning to brute force attacks aimed at snaring credentials.

Email security strongest from social media, report reveals

One in seven emails from financial brands poses risks to consumers, a study suggests.

Denial-of-Service attacks trend to bigger scope, shorter times

Distributed Denial of Service (DDoS) attacks are getting bigger, but their duration are getting shorter, according to an analysis released last week by Arbor Networks.

sms phishing

SMS spam intensifies, ranging from pesky to perilous

'Over-the-top' services are used to disguise text spam campaigns by sending a few messages from many phone numbers.

on techhive.com

smartphone malware

Spam blizzards sometimes seed malware, AppRiver study warns

Distributed Spam Distraction attacks may last up to 24 hours, and inundate an inbox with as many as 60,000 messages, AppRiver report notes in a report.

sms phishing

SMS spam borrows from email phishing with empty promises

Texting scams continue to increase, with scammers using come-ons similar to the phishing techniques used in spam email for years.

Data breaches caused mostly by negligence and glitches, study finds

Almost two-thirds of data breaches in 2012 could be attributed to negligence or human error and system glitches, reported the eighth annual Ponemon Global Cost of a Data Breach study.