Threats RSS Feed - Symantec Corp.

http://www.symantec.com/business/security_response/landing/threats.jsp

W32.Changeup!gen48

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Low. Type: Worm.

Infostealer.Retgate

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2014-2820

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Exp.CVE-2014-2823

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Exp.CVE-2014-4057

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Trojan.FakeAV!gen129

- Mon, 18 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Volgmer

- Mon, 18 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstallRx.1e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstallRx.2e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstallRx.3e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstallRx.4e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Trojan.5e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.6e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.DomaIQ.7e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.8e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.9e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstallRx.11e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.MegaSrch.10e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Tarma.12e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.MegaSrch.13e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstallRx.14e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.15e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.16e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.17e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.18e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.19e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Graftor.20e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.21e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Adload.22e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.OutBrowse.1e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.DomaIQ.2e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstallRx.7e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstallRx.6e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.OutBrowse.2e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Soft32Dwn.1e

-

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.1e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.DomaIQ.3e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.3e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.SoftPulse.3e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.AdGazelle.1e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Widdit.1e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Downware.1e

- Tue, 19 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Bruterdep!gen2

- Fri, 15 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ransomcrypt.N

- Sat, 16 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Zbot!gen82

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Low. Type: Trojan.

Trojan.Blueso

- Fri, 15 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Adware.Maltrec.TS!g23

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g24

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g25

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g26

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g27

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g28

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g29

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g30

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g31

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g18

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g20

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g21

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g22

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g23

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g24

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g25

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g26

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.Maltrec.TS!g27

- Thu, 14 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Maltrec.TS!g32

- Mon, 18 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Trojan.Qhosts!gen1

- Wed, 13 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Trogle

- Tue, 12 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Worm.

Backdoor.Goldsun

- Tue, 12 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Turla!gen2

- Tue, 12 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Lapadin

- Tue, 12 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Backdoor.Backtor

- Mon, 11 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Scieron.B

- Mon, 11 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Adware.Crossid!gen1

- Tue, 12 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Backdoor.Citrat

- Mon, 11 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.Changeup!gen47

- Mon, 11 Aug 2014 00:00:00 +0000

Risk Level: Low. Type: Worm.

Trojan.Turla!gen1

- Fri, 8 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Bruterdep!gen1

- Sat, 9 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Loadmoney!gen2

- Thu, 7 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Backdoor.Korplug!gm

- Thu, 7 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Scartibro

- Thu, 7 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Mdropper!gen2

- Wed, 6 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Bitterbug

- Wed, 6 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Synolocker

- Thu, 7 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.FakeAV!gen127

- Wed, 6 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Icoscript

- Tue, 5 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Skintrim!gen4

- Tue, 5 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.FakeAV!gen128

- Tue, 5 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Poweliks!gm

- Tue, 5 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Infostealer.Ldpinch!g2

- Tue, 5 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Sesafer

- Tue, 5 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Ascesso.C

- Mon, 4 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Worm.

SONAR.PUA!gen1

- Mon, 4 Aug 2014 00:00:00 +0000

Risk Level: Very Low.

Trojan.Poweliks

- Mon, 4 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Downloader.Ponik!gen6

- Fri, 1 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Backoff!gm

- Sat, 2 Aug 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Zbot!gen81

- Thu, 31 Jul 2014 00:00:00 +0000

Risk Level: Low. Type: Trojan.

Trojan.Cryptolocker!g5

- Thu, 31 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Backoff

- Thu, 31 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Bloodhound.Exploit.554

- Thu, 31 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Trojan.Zbot!gen80

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Low. Type: Trojan.

Packed.Mystic!gen14

- Thu, 31 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Syndicasec!gen1

- Wed, 30 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Chikdos.B!gen2

- Wed, 30 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Exp.CVE-2013-3910

-

Risk Level: Very Low.

Adware.Dealply!gen1

- Wed, 30 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

W32.Gammima.AG!gen8

- Thu, 31 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Virus, Worm.

Trojan.Scieron!gen2

- Thu, 31 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Gen.4

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

PUA.Gen.2

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Spyware.Gen

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

RemoteAccess.Gen

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Hacktool.Gen

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Trackware.Gen

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

SecurityRisk.Gen

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Adware.Gen.2

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Joke.Gen

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Dialer.Gen.2

- Mon, 28 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Trojan.Retefe

- Fri, 25 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Loadmoney!gen1

- Fri, 25 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

PUA.ChangeDNS

- Thu, 24 Jul 2014 00:00:00 +0000

Risk Level: Very Low.

Backdoor.Baccamun

- Fri, 25 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Scieron!gen1

- Thu, 24 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Scieron

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Bankosy

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Android.Simplocker.B

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstalleRx.7

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Downware.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Widdit.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.AdGazelle.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.SoftPulse.3

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.3

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.2

-

Risk Level: Very Low. Type: Trojan.

W32.SAPE.DomaIQ.3

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Heur.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.Soft32Dwn.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.OutBrowse.2

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.InstalleRx.6

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.DomaIQ.2

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

W32.SAPE.OutBrowse.1

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Gen.SMH.2

- Tue, 22 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.ADH.SMH.2

- Tue, 22 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Trojan.Kasidet

- Tue, 22 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan, Worm.

Trojan.Zbot!gen79

- Wed, 23 Jul 2014 00:00:00 +0000

Risk Level: Very Low. Type: Trojan.

Security News Headlines - Yahoo! News

http://news.yahoo.com/security/

U.S. hospital breach biggest yet to exploit Heartbleed bug: expert

- Wed, 20 Aug 2014 02:29:40 -0400

A lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in ParisHackers who stole the personal data of about 4.5 million patients of hospital group Community Health Systems Inc broke into the company's computer system by exploiting the "Heartbleed" internet bug, making it the first known large-scale cyber attack using the flaw, according to a security expert. The hackers, taking advantage of the pernicious vulnerability that surfaced in April, got into the system by using the Heartbleed bug in equipment made by Juniper Networks Inc, David Kennedy, chief executive of TrustedSec LLC, told Reuters on Wednesday. Community Health Systems said on Monday that the attack had originated in China. Once in, they hacked their way into a database and stole millions of social security numbers and other records, he said.


U.S. government's nuclear watchdog victim of cyber attacks: report

- Tue, 19 Aug 2014 16:33:20 -0400

A hand is silhouetted in front of a computer screen in this picture illustration taken in BerlinNuclear Regulatory Commission was "successfully hacked" three times in recent years in attacks involving tainted emails, according to an internal investigation on cyber attacks at the agency, Nextgov.com reported on Tuesday. At least two of the attacks originated overseas, according to the report obtained by Nextgov, a rare public report with details of a cyber attack on the energy sector. The publication said it obtained a copy of a report by the NRC's Office of the Inspector General, which reviewed 17 suspected breaches from 2010 to 2013. "The few attempts documented in the OIG Cyber Crimes Unit report as gaining some access to NRC networks were detected and appropriate measures were taken," NRC spokesman David McIntyre said.


Now That Everyone?s Leaving, Things Sure Are Dull 'Under the Dome'

- Tue, 19 Aug 2014 08:16:00 -0400

Now That Everyone?s Leaving, Things Sure Are Dull 'Under the Dome'Yeah, things go pretty smoothly for about half a day there, before Jim gets handcuffed to a prison cell by the last Sherriff, but for Dome that?s pretty good.


US won't reveal records on health website security

- Tue, 19 Aug 2014 03:26:16 -0400

This March 1, 2014 file photo shows part of the website for HealthCare.gov in Washington. The Obama administration has concluded it will not publicly disclose federal records that could shed light on the security of the government's signature health care website because doing so could "potentially" allow hackers to break in. (AP Photo/Jon Elswick)WASHINGTON (AP) ? After promising not to withhold government information over "speculative or abstract fears," the Obama administration has concluded it will not publicly disclose federal records that could shed light on the security of the government's health care website because doing so could "potentially" allow hackers to break in.


Community Health says data stolen in cyber attack from China

- Mon, 18 Aug 2014 22:15:35 -0400

A hand is silhouetted in front of a computer screen in this picture illustration taken in BerlinSecurity experts said the hacking group, known as "APT 18," may have links to the Chinese government. "APT 18" typically targets companies in the aerospace and defense, construction and engineering, technology, financial services and healthcare industry, said Charles Carmakal, managing director with FireEye Inc's (FEYE.O) Mandiant forensics unit, which led the investigation of the attack on Community Health in April and June.


How Microsoft filled its Windows Store with app scams waiting to steal your money

- Mon, 18 Aug 2014 15:45:09 -0400

How Microsoft filled its Windows Store with app scams waiting to steal your moneyMicrosoft might have just stolen some money from you with help of the Windows Store.†In an extensive look at the ?cesspool of scams? in†the Windows Store,†How-To Geek reveals how the store is crammed with fake versions of popular paid apps that people are unwittingly giving money to. And it all happens with Microsoft?s knowledge, which has not only encouraged (read: paid) developers to create apps for Windows, but has already manually verified them and approved them, and it?s taking a cut of any profits developers make from sales. Looking for various apps, including VLC, iTunes, Adobe?s Flash, Firefox, Candy Crush Saga, WhatsApp, Spotify, and many others, the search results will return many apps, in addition to the real ones, that


Community Health details attack on patient records

- Mon, 18 Aug 2014 11:51:50 -0400

FRANKLIN, Tenn. (AP) ? Hospital operator Community Health Systems said a cyberattack took information on more than 4 million patients from its computer network earlier this year.

Community Health Systems says data stolen in cyber attack

- Mon, 18 Aug 2014 08:30:39 -0400

Photo illustration shows USB device being plugged into a laptop computer in Berlin(Reuters) - U.S. hospital operator Community Health Systems Inc said it suspected data of about 4.5 million clients were stolen by Chinese hackers from its computer network. The company and its security contractors Mandiant, a unit of FireEye Inc, believes the attack occurred in April and June, Community Health Systems said in a regulatory filing. (Reporting by Shailesh Kuber; Editing by Joyjeet Das)


Researchers figure out how to spy on your smartphone in a way you?ll never see coming

- Fri, 15 Aug 2014 21:15:02 -0400

Researchers figure out how to spy on your smartphone in a way you?ll never see comingOne common smartphone sensor†that never seemed to pose much of a threat†might in fact be the key to eavesdropping on a stranger?s conversation from afar. According to Wired, a group of researchers from Stanford University and the Israeli defense research group Rafael are going to hold a presentation at the Usenix security conference next week that†will demonstrate how the gyroscope in your phone can be converted into ?crude microphones? which can pick up sound waves in the area. We typically think of the gyroscope as the tool that allows us to tilt our iPhones and interact with games and apps, but with the Gyrophone software built by the research team, the sensor can be repurposed to listen in on a


Renewed fighting in Ukraine rattles stocks

- Fri, 15 Aug 2014 16:42:06 -0400

FILE - This Aug. 9, 2011 file photo shows a Wall Street street sign near the New York Stock Exchange, in New York. Global stock markets mostly rose Friday, Aug. 15, 2014 cheered by the prospect of more gains on Wall Street and a sense that Ukraine tensions are easing. (AP Photo/Mark Lennihan, File)NEW YORK (AP) ? Renewed fighting in Ukraine rattled markets on Friday. Reports that Ukrainian forces attacked Russian military vehicles that had crossed the border knocked stock markets down in the afternoon and sent traders into the safety of U.S. government bonds.


Huge launches from Samsung, Sony, Microsoft and more are coming in three weeks

- Fri, 15 Aug 2014 14:25:46 -0400

Huge launches from Samsung, Sony, Microsoft and more are coming in three weeksThis fall is shaping up to be an action-packed one for smartphone fans. While every unannounced handset we know about so far will likely†be an iterative update as opposed to an innovative release ? this is, after all, a boring year for smartphone lovers ? there will still be plenty of solid new options for shoppers heading into the holidays. As is the case each year, Apple?s upcoming new iPhone is easily the most hotly anticipated of the bunch. According to dozens of reports, the iPhone 6 will finally feature a significantly larger display alongside upgraded internals. Beyond Apple?s new iPhone, however, there is plenty more in store ? and it looks like the best and brightest of the bunch


Supervalu becomes latest to suffer data breach

- Fri, 15 Aug 2014 14:25:04 -0400

FILE - In this Jan. 9, 2012 file photo, customers exit a Shop' Save grocery store in Mount Lebanon, Pa. Supervalu said Friday, Aug. 15, 2014, that a potential data breach may have impacted about 200 of its stores and reached stores it sold off last year. The announcement is just the latest disclosure by a business that its systems have been intruded, with P.F. Chang?s, Target and others among those recently revealing breaches. Within the grocery sector, chains such as Yoke?s Fresh Market and Super 1 Foods were hit by a data breach between September and November 2013. (AP Photo/Gene J. Puskar, File)NEW YORK (AP) ? A data breach at Supervalu may have impacted as many as 200 of its grocery and liquor stores and potentially affected retail chains recently sold by the company in two dozen states.


Chinese envoy to Canada tries to ease bilateral ties in article

- Fri, 15 Aug 2014 13:30:50 -0400

China's ambassador to Canada on Friday played down a sudden deterioration of bilateral ties which have been strained by allegations of Chinese hacking and the detention of a Canadian couple. Luo Zhaohui said in an article posted on the Globe and Mail's website on Friday that while it was "hard to avoid bumps and grumps between countries," the overall state of relations was good. Late last month, for the first time ever, Canada accused Chinese hackers of being responsible for an attack on a government computer. A few days later China detained a Canadian couple on suspicious of spying.

U.S. supermarket chain Supervalu investigating potential data breach

- Fri, 15 Aug 2014 01:51:44 -0400

(Reuters) - Supervalu Inc said it is investigating a potential data breach that could have affected some of its retail food stores, including some of its associated stand-alone liquor stores. Supervalu said the intrusion may have resulted in the theft of account numbers and other numerical information from payment cards used at some point-of-sale systems at the company's owned and franchised stores. The data breach appears to have taken place during the period of June 22 through July 17, said the retailer. "The intrusion was identified by our internal team, it was quickly contained, and we have had no evidence of any misuse of any customer data," Supervalu CEO, Sam Duncan, said in a statement early on Friday.

Family of Canadian couple detained by China hires Beijing lawyers

- Thu, 14 Aug 2014 14:44:40 -0400

Simeon Garratt, son of Canadian couple Kevin and Julia Dawn Garratt who are being investigated in China for threatening national security, talks to a Reuters journalist in VancouverThe son of a Canadian couple detained in China on charges of espionage said the family had hired a lawyer in Beijing because the Canadian government had not been able to help the family visit or communicate with his father, a Christian aid worker. Kevin and Julia Garratt, who ran a coffee shop on the Chinese border with North Korea, were detained Aug. 4 on suspicion they stole state secrets and for threatening national security. "We have brought on legal counsel in Beijing as of today. The embassy has done all it can so now we are taking a bit more control," Simeon Garratt, who lives in Vancouver, told Reuters on Thursday.


Cisco to take $700 million in restructuring charges for layoffs

- Thu, 14 Aug 2014 12:47:24 -0400

A Cisco office sign is pictured in San Diego, CaliforniaNetwork equipment maker Cisco Systems Inc said on Thursday its plan to slash 6,000 jobs will result in restructuring charges of $700 million in cash in the year ending July 2015. The latest round of layoffs, announced on Wednesday, is at least the fourth workforce reduction in about as many years for a company once synonymous with the Internet boom and could spark a shakeup in management, analysts said. Shares in Cisco, still the world's largest networking equipment maker, were down 2.7 percent at $24.52 on the Nasdaq. Cisco has failed to sustain growth in its high-end switches and routers business and is grappling with competition from so-called software-defined networks (SDN) which offer software that can run on cheap hardware.


Cisco to take $700 million in restructuring charges in 2015

- Thu, 14 Aug 2014 12:31:27 -0400

(Reuters) - Network equipment maker Cisco Systems Inc said it would take restructuring charges of $700 million in cash in the year ending July 2015 related to its plan to cut 6,000 jobs. Cisco shares were down 1.5 percent at $24.82 in premarket trading on the Nasdaq. Cisco will recognize $250 million to $350 million of the charges in the first quarter, the company said in a regulatory filing. Chief Executive John Chambers on Wednesday blamed uncertainty in global demand for the job cuts.

Is your data really safe? These are the 8 worst security breaches in history

- Thu, 14 Aug 2014 12:20:27 -0400

Is your data really safe? These are the 8 worst security breaches in historyCan your online data ever really be safe? Not when malicious hackers are lurking around every virtual corner, constantly developing devious new ways to steal sensitive data including passwords and credit card information. Online security is constantly improving, of course, but even the biggest companies in the world are susceptible to security breaches. And the sad truth of the matter is that there?s nothing you can do to protect your data once it?s stored on a company?s servers. In case that harsh realization isn?t scary enough on its own, a new graphic helps remind us of the eight worst online security breaches in recent history. FROM EARLIER: How to disappear online Just a couple of days after sharing an infographic


Despite hackers, chief won't ID cop in shooting

- Thu, 14 Aug 2014 06:56:36 -0400

The police chief in the St. Louis suburb where an officer fatally shot an unarmed teenager said Wednesday that cyber-attacks on his city's website won't sway him into releasing the officer's name. Ferguson ...

Russian PM's office denies spoof tweet saying he quits

- Thu, 14 Aug 2014 04:38:35 -0400

Russia's Prime Minister Dmitry Medvedev addresses the State Duma, the lower house of parliament, in MoscowHackers on Thursday broke into the Twitter account of Russian Prime Minister Dmitry Medvedev and posted a spoof message saying he was quitting. Medvedev is often the butt of jokes in Russia, with some people accusing him of being the puppet of President Vladimir Putin. Vova! You are wrong!" There was disappointment among many in Russia's Internet-savvy middle class after Medvedev stepped down from the presidency to allow Putin to return for a third Kremlin term in 2012, a decision that sparked big street protests in Moscow.


Protests turn violent in St. Louis suburb

- Wed, 13 Aug 2014 23:56:01 -0400

FERGUSON, Mo. (AP) ? Protests in the St. Louis suburb rocked by racial unrest since a white police officer shot an unarmed black teenager to death turned violent Wednesday night, with some people lobbing Molotov cocktails and other objects at police who responded with smoke bombs and tear gas to disperse the crowd.

The NSA wants to eliminate malware once and for all, no matter the cost

- Wed, 13 Aug 2014 20:15:18 -0400

The NSA wants to eliminate malware once and for all, no matter the costWell over a year after the Snowden leaks changed the way we think of security in the United States, the man still has plenty of information left to reveal. In an exhaustive interview with Wired?s James Bamford, Snowden discussed the NSA?s development of a new cyberwarfare program codenamed MonsterMind which could automatically seek out patterns that indicate a looming cyberattack and stop them at the source. This might sound like a dream come true, especially for Windows and Android users who are constantly wary of the threat of malware, but Snowden is worried that the NSA have taken the security measure a step too far. Rather than simply stopping the threat, MonsterMind has the ability†to retaliate without any human oversight.


Report: NSA eyed preset strikes in cyberattacks

- Wed, 13 Aug 2014 16:49:15 -0400

This image provided by Platon/Wired shows the cover of the September 2014 issue of Wired magazine, featuring former National Security Agency contractor Edward Snowden. Snowden gave an exclusive interview with Wired, in the issue scheduled to hit newsstands on Aug. 26, 2014. (AP Photo/Platon/Wired)WASHINGTON (AP) ? The National Security Agency secretly planned a cyberwarfare program that could automatically fire back at cyberattacks from foreign countries without any human involvement, creating the risk of accidentally starting a war, according to a new report based on interviews with former NSA contractor Edward Snowden.


Planned U.S. cyber warfare program could hurt innocent countries: Snowden

- Wed, 13 Aug 2014 10:28:40 -0400

Accused government whistleblower Snowden is seen on a screen as he speaks via videoconference with members of the Committee on legal Affairs and Human Rights of the Parliamentary Assembly of the Council of Europe in StrasbourgA developing U.S. cyber security program would not only hunt down and halt potential computer attacks but also strike back without staff oversight, according to former U.S. National Security Agency contractor, Edward Snowden. In an interview with WIRED magazine made public Wednesday, Snowden said the program - MonsterMind - could hurt countries caught in the middle as hackers could disguise the origin of their attacks by routing them through computers in other nations. "These attacks can be spoofed," Snowden told the magazine. "You could have someone sitting in China, for example, making it appear that one of these attacks is originating in Russia.


Ferguson seeks answers after fatal police shooting

- Wed, 13 Aug 2014 09:56:07 -0400

A group demonstrates along and in the middle of Chambers Rd. outside the Greater St. Mark Missionary Baptist Church after the conclusion of a gathering with Michael Brown's family and Rev. Al Sharpton on Tuesday, Aug. 12, 2014, in Dellwood. The gathering at the church was in response to the police shooting of 18-year-old Michael Brown on Saturday. (AP Photo/St. Louis Post-Dispatch, Chris Lee)FERGUSON, Mo. (AP) ? Nights of unrest have vied with calls for calm in a St. Louis suburb where an unarmed black teenager was killed by police, while the community is still pressing for answers about the weekend shooting.


A Closer Look: Multitasking on mobile devices

- Mon, 11 Aug 2014 15:41:55 -0400

Smartphones and tablets would be much more useful if they allowed us to multitask the way desktop and laptop computers do. When I'm watching video, for instance, I have to pause it to read an email or ...

U.S. watchdog calls bitcoin 'Wild West' of finance

- Mon, 11 Aug 2014 14:12:57 -0400

Woman buys bitcoins at one of Southern California's first two bitcoin-to-cash ATMs which began operating today, in Venice, Los AngelesBy Douwe Miedema WASHINGTON (Reuters) - Virtual currencies such as bitcoin are the "Wild West" of financial products because of risks including huge swings in exchange rates, the U.S. Consumer Financial Protection Bureau said on Monday. "Virtual currencies are not backed by any government or central bank, and at this point consumers are stepping into the Wild West when they engage in the market," CFPB Director Richard Cordray said in a statement. Other risks include the fact that online or virtual currencies have been a target for hackers while some virtual currency companies have provided little help in cases where funds were lost or stolen, the CFPB said.


US agency warns consumers about Bitcoin risks

- Mon, 11 Aug 2014 12:47:04 -0400

WASHINGTON (AP) ? Federal regulators are warning consumers about the risks of using virtual currencies such as Bitcoin.

China smartphone maker Xiaomi apologizes for unauthorized data access

- Mon, 11 Aug 2014 06:58:32 -0400

Lei Jun, founder and CEO of China's mobile company Xiaomi, speaks at launch ceremony of Xiaomi Phone 4 in BeijingBy Gerry Shih BEIJING (Reuters) - Xiaomi Inc said it had upgraded its operating system to ensure users knew it was collecting data from their address books after a report by a computer security firm said the Chinese budget smartphone maker was taking personal data without permission. The privately held company said it had fixed a loophole in its cloud messaging system that had triggered the unauthorized data transfer and that the operating system upgrade had been rolled out on Sunday. Like Apple Inc's iMessage service, Xiaomi lets users avoid SMS charges by routing messages over the Internet rather than through a carrier's network. In a lengthy blogpost on Google Plus, Xiaomi Vice President Hugo Barra apologized for the unauthorized data collection and said the company only collects phone numbers in users' address books to see if the users are online.


Security experts call for government action against cyber threats

- Sat, 09 Aug 2014 15:33:05 -0400

By Joseph Menn LAS VEGAS (Reuters) - Alarmed by mounting cyber threats around the world and across industries, a growing number of security experts see aggressive government action as the best hope for averting disaster. Such fears and proposals on new laws and executive action to counter these threats were core topics this week in Las Vegas at Black Hat and Def Con, two of the world's largest gatherings for security professionals and hackers. At Black Hat, the keynote speech by respected researcher Dan Geer went straight for national and global policy issues. "Either software houses deliver quality and back it up with product liability, or they will have to let their users protect themselves," said Geer, who works for In-Q-Tel, a venture capital firm serving U.S. intelligence agencies.

Hacking group wants to play nice with automakers

- Fri, 08 Aug 2014 22:51:01 -0400

A group of Chevrolet Camaro cars for sale is pictured at a car dealership in Los Angeles, CaliforniaThe non-profit group, known as "I am the Cavalry," is asking attendees at this weekend's Def Con hacking conference in Las Vegas to sign an open letter to "Automotive CEOs" to ask them to implement basic guidelines to defend cars from cyber attacks. "Now is the time for the automotive industry and the security community to connect and collaborate." Vehicles rely on tiny computers to manage everything form engines and brakes to navigation, air conditioning and windshield wipers. The Cavalry group is scheduled to make a presentation at Def Con on Saturday about efforts to improve auto security. They will not disclose any specific problems that might embarrass carmakers, said Josh Corman, a security industry professional who co-founded the group a year ago. ††† That sensitivity contrasts with much of the hacking research presented these days at Def Con, which attracts more than 10,000 attendees.


John McAfee speaks at hacker conference, unveils complaint website

- Fri, 08 Aug 2014 21:54:29 -0400

Computer software pioneer McAfee speaks with reporters outside his hotel in Miami BeachJohn McAfee, the flamboyant anti-virus software industry pioneer, made a surprise appearance at a computer hackers' conference on Friday evening, where he unveiled a new website to give people a place online to vent their anger. The site, called BrownList (http://www.brownlist.com/), carries the motto "It's payback time." "This taps into anger in a positive way," he said in a brief interview before taking the stage at Def Con, the world's largest conference of computer hackers. "Instead of just lashing out, give us your positive solutions," he told an audience of hundreds of hackers taking part in a three-day conference.


Russian accused of hacking is arraigned in Seattle

- Fri, 08 Aug 2014 20:49:49 -0400

SEATTLE (AP) ? A Russian lawmaker's son accused of hacking computers at hundreds of U.S. businesses and stealing credit card information pleaded not guilty to 29 charges Friday.

Yahoo to join Google to create spy-free email systems: WSJ

- Fri, 08 Aug 2014 10:15:38 -0400

A Yahoo logo is pictured in front of a building in Rolle(Reuters) - Yahoo Inc said it will join Google†Inc to create a secure email system by next year that could make it nearly impossible for hackers or government officials to read users' messages, The Wall Street Journal reported. The move comes as large technology companies unite to beef up their defenses against government intrusion and hacking, most notably after Edward Snowden exposed last year the National Security Agency's mass surveillance programs. Google, Microsoft and Facebook Inc moved to encrypt internal traffic after revelations by Snowden that the spy agency hacked into their connections overseas. Yahoo has altered its email process so users adopting encryption type messages in a separate window, preventing even Yahoo from reading the messages as they are typed, the Journal said.


Now is the perfect time to pick up one of the world?s best iOS password managers

- Fri, 08 Aug 2014 08:45:22 -0400

Now is the perfect time to pick up one of the world?s best iOS password managersThe popular 1Password†is a great password manager for various devices, including iOS smartphones and tablets. And the best news is that the app will get even better once iOS 8 arrives, as Agile Bits plans to take advantage of Apple?s extension feature in iOS 8 to make 1Password work even easier and faster than before. In short, in iOS 8 users will be able to log into their favorite services without having to copy paste information from 1Password, as long as those apps support the password manager?s extension. FROM EARLIER: This is one iOS 8 feature you?ll absolutely love While 1Password is not available as a free download on iOS, users who are looking to buy the iOS 8 version


Exclusive: China police investigate U.S. citizen near border with North Korea - source

- Thu, 07 Aug 2014 18:17:06 -0400

By James Pearson and Megha Rajagopalan SEOUL/BEIJING (Reuters) - A Korean-American who runs a Christian NGO in a Chinese city on the border with North Korea is being investigated by Chinese authorities and has had his bank accounts frozen, a source with direct knowledge of the case told Reuters on Thursday. Peter Hahn, a naturalized U.S. citizen, has been under interrogation by Chinese authorities for the last three weeks and is not permitted to leave the country, said the source, who requested anonymity, citing the sensitive nature of the case. Several people working in the region, or who are in contact with those that do, said Hahn's case appeared to be part of a wider sweep of Christian-run NGOs and businesses along the Chinese side of the border with North Korea. While China can be suspicious of Christian groups and President Xi Jinping has launched a wide crackdown on underground churches, foreign missionaries usually operate without too much harassment.

Google using its clout to widen use of encryption

- Thu, 07 Aug 2014 15:16:33 -0400

SAN FRANCISCO (AP) ? Google is wielding the power of its dominant Internet search engine to push more websites into protecting the people using their services.

Spy agencies hit in cyber espionage campaign: Kaspersky Lab

- Thu, 07 Aug 2014 10:05:48 -0400

An employee works near screens in the virus lab at the headquarters of Russian cyber security company Kaspersky Labs in MoscowBy Jim Finkle LAS VEGAS (Reuters) - Security researchers at Kaspersky Lab said they have uncovered a cyber espionage operation that successfully penetrated two spy agencies and hundreds of government and military targets in Europe and the Middle East since the beginning of this year. The hackers,†according to Kaspersky, were†likely backed by a nation state and used techniques and tools similar to ones employed in two other high-profile cyber espionage operations that Western intelligence sources have linked to the Russian government. Kaspersky, a Moscow-based security software maker that also sells cyber intelligence reports, declined to say if it believed Russia was behind the espionage campaign.


Google to reward secure websites with better search ranking

- Thu, 07 Aug 2014 07:41:44 -0400

A Google search page is reflected in sunglasses in this photo illustration taken in Brussels(Reuters) - Google Inc said it is encouraging website developers to make their sites secure for visitors by using site encryption as one of the factors to determine search ranking. The company is urging website developers to adopt HTTPS, a form of website encryption that secures data send over the Web, to protect user data from hackers. "Over the past few months we've been running tests taking into account whether sites use secure, encrypted connections as a signal in our search ranking algorithms," the world's No. 1 search engine operator said on a blog post on Wednesday. (http://bit. ...


Canadian couple set up agency to help fund North Korean aid trips: friend

- Thu, 07 Aug 2014 00:22:17 -0400

Peter Garratt, one of the sons of Canadian couple Kevin and Julia Dawn Garratt who are being investigated in China for threatening national security, talks to Reuters journalists by the side of the Yalu River in DandongBy Nicole Mordant and Cameron French VANCOUVER/TORONTO (Reuters) - A Canadian couple detained in China amid spying allegations made regular trips to deliver goods to North Korea, their close friend and pastor said on Wednesday, and set up a British Columbia-based organization to collect funds for their work. Rich Kao, head minister at a small church just outside Vancouver that backs the Garratt's North Korea-focused charity, North Star Aid, said the trips were humanitarian ventures. Kao said the Garratts, who moved to China in 1984, had been doing missionary work in the country but came back to Canada about seven years ago. Soon after, they joined his church and then launched North Star Aid, the North Korea-focused aid group that has come under the spotlight since news of the Garratts' detention emerged.


 

Twitter / SecureMac

http://twitter.com/SecureMac

SecureMac: MacScan 2.9.3 with Google Chrome & SeaMonkey Support Released for Macs #privacy #security #mac - http://t.co/wCy0sddR

- Fri, 18 May 2012 14:52:24 +0000

SecureMac: MacScan 2.9.3 with Google Chrome & SeaMonkey Support Released for Macs #privacy #security #mac - http://t.co/wCy0sddR

SecureMac: Proud @MacworldUK and @MacworldAU reviewed @PrivacyScan and gave it 5/5 stars & an Editor's Choice award! http://t.co/ew6Wjj67

- Thu, 05 Apr 2012 01:30:08 +0000

SecureMac: Proud @MacworldUK and @MacworldAU reviewed @PrivacyScan and gave it 5/5 stars & an Editor's Choice award! http://t.co/ew6Wjj67

SecureMac: Researching new piece of Mac #malware that is currently in the wild infecting computers running OS X. http://t.co/38RsQVAQ

- Tue, 20 Mar 2012 06:00:04 +0000

SecureMac: Researching new piece of Mac #malware that is currently in the wild infecting computers running OS X. http://t.co/38RsQVAQ

SecureMac: SecureMac is honored ~ @MacworldUK has awarded @PrivacyScan as Best of Show for Macworld | iWorld this year. http://t.co/bBqaCH7F

- Fri, 16 Mar 2012 20:18:06 +0000

SecureMac: SecureMac is honored ~ @MacworldUK has awarded @PrivacyScan as Best of Show for Macworld | iWorld this year. http://t.co/bBqaCH7F

SecureMac: Attention Developers, @SecureMac is hiring Cocoa Developers. http://t.co/F4Give2s #jobs #dev #hiring

- Tue, 13 Mar 2012 18:52:23 +0000

SecureMac: Attention Developers, @SecureMac is hiring Cocoa Developers. http://t.co/F4Give2s #jobs #dev #hiring

SecureMac: SecureMac is hiring more Mac Cocoa Developers. See requirements & submit resume! #jobs #macjobs http://t.co/LOfi5e5T

- Mon, 05 Mar 2012 21:06:20 +0000

SecureMac: SecureMac is hiring more Mac Cocoa Developers. See requirements & submit resume! #jobs #macjobs http://t.co/LOfi5e5T

SecureMac: Read how Google's accused of Bypassing Safari's Privacy Controls http://t.co/1KyOlzbH Another Reason for @MacScan @PrivacyScan

- Fri, 17 Feb 2012 16:55:34 +0000

SecureMac: Read how Google's accused of Bypassing Safari's Privacy Controls http://t.co/1KyOlzbH Another Reason for @MacScan @PrivacyScan

SecureMac: PrivacyScan 1.0.1 has been released and is available on the Mac App Store adding bug fixes still 4.99! http://t.co/8fV15Tm7

- Wed, 08 Feb 2012 05:58:53 +0000

SecureMac: PrivacyScan 1.0.1 has been released and is available on the Mac App Store adding bug fixes still 4.99! http://t.co/8fV15Tm7

SecureMac: With the launch of @PrivacyScan in the Mac App Store we're #1 in utilities and ranking in top 10 paid overall. Day 1 http://t.co/Chc4IZDE

- Fri, 27 Jan 2012 02:19:15 +0000

SecureMac: With the launch of @PrivacyScan in the Mac App Store we're #1 in utilities and ranking in top 10 paid overall. Day 1 http://t.co/Chc4IZDE

SecureMac: @fakemacfusion Are you on the macworld press list? Let me know your email to get you off the PR list.

- Thu, 26 Jan 2012 16:06:39 +0000

SecureMac: @fakemacfusion Are you on the macworld press list? Let me know your email to get you off the PR list.

SecureMac: SecureMac staff will be on the Macworld show floor today at booth #442 talking security and demonstrating @PrivacyScan & @MacScan

- Thu, 26 Jan 2012 16:04:23 +0000

SecureMac: SecureMac staff will be on the Macworld show floor today at booth #442 talking security and demonstrating @PrivacyScan & @MacScan

SecureMac: PrivacyScan is now live on the Mac App Store! Check it out and give us your feedback! http://t.co/4W4y8ztO

- Wed, 25 Jan 2012 16:54:46 +0000

SecureMac: PrivacyScan is now live on the Mac App Store! Check it out and give us your feedback! http://t.co/4W4y8ztO

SecureMac: Need an Free/Discounted Expo Hall Pass to @Macworldexpo ? Get em while they last! http://t.co/gHP8PaZe #macworld

- Thu, 19 Jan 2012 20:39:49 +0000

SecureMac: Need an Free/Discounted Expo Hall Pass to @Macworldexpo ? Get em while they last! http://t.co/gHP8PaZe #macworld

SecureMac: We're going to be at @macworldexpo booth #442! Be sure to stop by and learn about the latest products!

- Wed, 18 Jan 2012 22:30:24 +0000

SecureMac: We're going to be at @macworldexpo booth #442! Be sure to stop by and learn about the latest products!

SecureMac: Getting ready for #macworld ~ booth 442. Be sure to follow us if you're still looking for a free expo hall pass, and watch for link.

- Fri, 06 Jan 2012 19:20:40 +0000

SecureMac: Getting ready for #macworld ~ booth 442. Be sure to follow us if you're still looking for a free expo hall pass, and watch for link.

SecureMac: Start off your New Year by changing your passwords. How long has it been? #macsecurity

- Wed, 04 Jan 2012 17:03:38 +0000

SecureMac: Start off your New Year by changing your passwords. How long has it been? #macsecurity

SecureMac: @ken_gok email macsec@securemac.com with as much info as you have on what you downloaded including links and we can check it out!

- Fri, 23 Dec 2011 15:50:24 +0000

SecureMac: @ken_gok email macsec@securemac.com with as much info as you have on what you downloaded including links and we can check it out!

SecureMac: MacScan 2.9.2 Released! Celebrate with us and download a free 30-day trial or upgrade your app! http://t.co/xr3NJoQk

- Tue, 20 Dec 2011 17:09:59 +0000

SecureMac: MacScan 2.9.2 Released! Celebrate with us and download a free 30-day trial or upgrade your app! http://t.co/xr3NJoQk

SecureMac: Love Cyber Monday? Get the http://t.co/G8EB7cwc software bundle for 49.99! First 10k people get MacScan!

- Mon, 28 Nov 2011 17:23:17 +0000

SecureMac: Love Cyber Monday? Get the http://t.co/G8EB7cwc software bundle for 49.99! First 10k people get MacScan!

SecureMac: RT @macscan: 1 Day Only - Black Friday Sale ~ MacScan 80% OFF Use Coupon Code CYBERSALE11 - http://t.co/AtD091ty

- Fri, 25 Nov 2011 05:08:17 +0000

SecureMac: RT @macscan: 1 Day Only - Black Friday Sale ~ MacScan 80% OFF Use Coupon Code CYBERSALE11 - http://t.co/AtD091ty