Cybereye

CyberEye

  • User with computer mouse

    New malware waits for a mouse click before executing

    The Trojan Upclicker evades automated detection tools by monitoring mouse activity to make sure it is dealing with a human before jumping into action.

  • Bill Jackson bats 500 on 2012 threat predictions

    Threat predictions for 2012: The hits and misses

    Despite taking the safe road by predicting that threats for 2012 would be a lot like those of 2011, the CyberEye still managed to only bat about .500.

    Comments: 1
  • https signals a secure site

    Mobile users get no clue they're visiting malicious sites

    With security information limited by screen size, even experts can't tell when they're visiting malicious sites, according to a Georgia Tech study.

  • Three signs saying "No"

    BlackBerry’s blacklist: 106 passwords you can't use

    RIM's long-awaited BlackBerry 10 OS contains a blacklist of passwords that users will not be allowed to use. Maybe it's not a great idea, but it's a good one.

    Comments: 4
  • Phishing expedition

    Spear-phishing scourge: It's up to you, the user

    Browsers are getting better at blocking phishing sites, but phishers are getting more nimble at keeping their sites on the move.

    Comments: 1
  • Mobile apps

    Mobile devices show low rate of malware infections

    Despite the growing number of malicious apps for Android devices, researchers at Georgia Tech found a surprisingly low rate of infections on phones in the United States.

  • Starting line

    Still at the starting line in the cyberdefense race

    DOD wants a baseline of security standards for defending civilian critical infrastructure and clear lines of authority for sharing information across sector boundaries.

  • Free apps

    Security gets short shrift in mobile apps

    A lack of attention from developers and users to the security of mobile applications has troubling implications for those who would bring mobile devices into the workplace.

    Comments: 1
  • International flags

    Putting cybersecurity on the diplomatic agenda

    The EastWest Institute is holding its third cybersecurity summit in India next week, part of an effort to bring nations together in this strange new world called cyberspace.

    Comments: 1
  • Voting machine

    Securing voting machines is only half the battle

    With the growing use of electronics in voting systems, the security of network connections are increasingly important, and sometimes overlooked.

    Comments: 1