View Full Version : Security News

Pages : 1 [2] 3 4 5 6 7 8

  1. Microsoft pushes crypto standards forward
  2. Microsoft unveils Cybercrime Center to tackle malware, botnets, etc...
  3. The Enhanced Mitigation Experience Toolkit v4.1
  4. MSRT November 2013 - Napolar
  5. Even the space station has been infected by malware, claims Kaspersky
  6. New IE zero-day attack reported
  7. Chrome To Start Rejecting Extensions From Outside The Chrome Store
  8. Security researcher says new malware can affect your BIOS
  9. Security's weakest link: Technology no match for social engineering
  10. Chrome Protecting Windows users from malicious extensions
  11. Spike in traffic with TCP source port zero has researchers worried
  12. Secunia Country Reports
  13. Vulnerability in Microsoft Graphics Component Could Allow Remote Code
  14. Upatre: Emerging Up(d)at(er) in the wild
  15. Google Chrome Adds Malware Blocker
  16. New Injection Campaign Peddling Rogue Software Downloads
  17. Has Microsoft just PROVED why you should upgrade from XP?
  18. Microsoft won’t turn on Windows Defender for unprotected PCs
  19. Microsoft may end antivirus updates on XP in April
  20. New cybersecurity report details risk of running unsupported software
  21. Adobe security breach actually affected closer to 38 million users
  22. Microsoft malware protection metrics - September results
  23. Hackers compromise official PHP website, infect visitors with malware
  24. Why you should not use autocomplete
  25. Application-layer DDoS attacks are becoming increasingly sophisticated
  26. Dirty Dozen spam sending nations - find where you finished
  27. Malwarebytes released for Android
  28. Malcovery Security: The company spammers and phishers hate
  29. D-Link Router backdoor vulnerability discovered
  30. How your identity gets swiped even if you're careful
  31. Nordstrom Finds Cash Register Skimmers
  32. Google May Feature You In An Ad With 'Shared Endorsements'
  33. Redirect hides browser extension
  34. 5 Wi-Fi security myths you must abandon now
  35. Our commitment to Microsoft antimalware
  36. pcworld: threats via a compromised webcam
  37. Trend Micro Acquires Broadweb
  38. Adobe's first update since the Big Breach - RoboHelp, Acrobat and Read
  39. Microsoft awards $100,000 to researcher for attack technique
  40. Phone charger can place user on malware alert
  41. New proof-of-concept tool detects stealthy malware hiding in graphics
  42. Massive Compromise of Adobe Source Code
  43. Three new attacks using IE zero-day exploit
  44. Microsoft Security Bulletin Advance Notification for October 8th 2013
  45. Hidden click fraud botnet uncovered
  46. Malicious browser extensions pose a serious threat and defenses are...
  47. F-Secure just released its Threat Report for first half of 2013
  48. Shylock Financial Malware Back and Targeting Two Dozen Major Banks
  49. Security researchers create undetectable hardware trojans
  50. Revoyem Ransomware Sinks to New Low
  51. Surreptitiously Tampering with Computer Chips
  52. Vulnerability in Internet Explorer Could Allow Remote Code Execution
  53. Oracle finally adds whitelisting capabilities to Java
  54. Security of Java takes a dangerous turn for the worse, experts say
  55. Firefox OS likely to face HTML5, Boot-to-Gecko attacks
  56. Shame on you! Report: Users lazier than ever about security practices
  57. Microsoft security bulletin for September 10 2013
  58. New advanced banking Trojan in the wild
  59. First case of Android Trojan spreading via mobile botnets discovered
  60. MS Security Bulletin Advance Notification for September 5th 2013
  61. NetTraveler Variant Adds Java Exploits, Watering Hole Attacks...
  62. Unpatched Mac bug gives attackers “super user” status
  63. Java 6 users vulnerable to zero day flaw, security experts warn
  64. Malicious Chrome extensions on the rise
  65. ESET reports trojan in Orbit Downloader
  66. Why does Malwarebytes keep flagging my favorite sites as malware?
  67. Microsoft predicts bleak future for XP users after patches run out
  68. Android becomes Windows' equal as a target for hackers
  69. Apple Store's malware problem exposed by researchers
  70. Security Researcher Hacks Mark Zuckerberg’s Wall To Prove His Exploit
  71. LastPass password manager gets security patch against password leakage
  72. The professionalization of malware
  73. Web servers are hackers’ target of choice
  74. XP's retirement will be hacker heaven
  75. Microsoft security bulletin for August 13 2013
  76. “Hand of Thief” banking trojan doesn’t do Windows—but it does Linux
  77. Chrome password security issue stirs debate
  78. New strain of ransomware evades detection by AV apps
  79. Windows Phones open to hackers when connecting to rogue Wi-Fi
  80. Wi-Fi routers: More security risks than ever
  81. Researchers demo exploits that bypass Windows 8 Secure Boot
  82. Boffins: We have FOOLED APPLE with malware app
  83. Canonical bares breach details as Apple continues security silence
  84. Chrome, Firefox users targeted with account-hijacking plugins
  85. Facebook pushes all users onto more secure connection by default
  86. XKeyscore NSA tool uncovered, collects pretty much the whole internet
  87. USB flash drives masquerading as keyboards
  88. Feds tell Web firms to turn over user account passwords
  89. Smishing: A Serious Identity Theft Scheme
  90. Android malware samples jump six-fold in Q2
  91. Equal-opportunity malware targets Macs and Windows
  92. Apple Developer portal breach credited to security researcher
  93. SIM card has finally been hacked: Billions of phones at risk
  94. Cyberattacks account for up to $1 trillion in global losses
  95. Unusual file-infecting malware steals FTP credentials
  96. New vulnerability in Java 7 opens door to 10-year-old attack
  97. Android's very real 'Master Key' vulnerability
  98. How to tackle JavaScript-based ransomware sites
  99. IT security spend up, but in the wrong places, Oracle says
  100. How Microsoft handed the NSA access to encrypted messages
  101. Here's what an eavesdropper sees when you use an unsecured Wi-Fi hotsp
  102. New disk wiper malware linked to attacks in South Korea
  103. Uncovering Android Master Key That Makes 99% of Devices Vulnerable
  104. Vobfus and Beebone: Two computer viruses team up to infect computers
  105. Ubisoft warns millions of video gamers of hack attack
  106. Malwarebytes Revisits Geolocation Metadata In Our Toys
  107. Anatomy of a browser trick - you've heard of "clickjacking", now meet
  108. Six Percent of Free Android Apps Hide Intrusive Adware
  109. Most Internet users have fallen victim to malware
  110. Opera developers explain why malicious "update" wasn't detected
  111. Hard drive-wiping malware part of new wave of threats targeting SKorea
  112. Leak of powerful malware tool like “handing a bazooka to a child”
  113. One-click/key attack forces IE and Chrome to execute malicious code
  114. Facebook leaks are a lot leakier than Facebook is letting on
  115. Fake BlackBerry Messaging App Tricks 100,000 Android Users
  116. Opera breached, has code cert stolen, possibly spreads malware - advic
  117. Mobile malware grows by 614 percent in last year
  118. Vast majority of malware attacks spawned from legit sites
  119. Google adds malware site flags to Transparency Report
  120. Stanford, Mozilla, Opera team up to tackle cookie privacy issues
  121. Malwarebytes unveils ExplotShield-based Anti-Exploit Beta
  122. Facebook bug exposed contact info of 6M users
  123. Microsoft Citadel botnet assault liberated 2 million PCs
  124. Microsoft unleashes bug bounty program — for betas, too
  125. Oracle to fix 40 holes in Java on Tuesday, 18 June 2013
  126. EMET 4.0 now available for download
  127. Latest from AV comparatives
  128. Malware masquerading as Bad Piggies found on Google Play
  129. Microsoft misses Google-found flaw in Patch Tuesday updates
  130. Microsoft security bulletin for June 11 2013
  131. Android trojan attempts to spread via Bluetooth
  132. Microsoft Security Bulletin Advance Notification for June 2013
  133. New leak shows feds can access user accounts for Google, Facebook...
  134. Malware increasingly uses peer-to-peer communications, researchers say
  135. Microsoft helps disrupt massive financial cybercrime ring
  136. Google beefs up the cash bounty for reporting vulnerabilities
  137. Apple's OS X and Safari get biggish security fixes
  138. Charger can hack Apple devices with ‘alarming ease’, researchers claim
  139. For the love of God, please secure your wireless networks
  140. Oracle reveals plans for Java security improvements
  141. Judge: FBI Doesn't Need a Warrant to Access Google Customer Data
  142. Carna Botnet Analysis Renders Scary Numbers on Vulnerable Devices
  143. Malware-splosion: 2013 Will be Malware's Biggest Year Ever
  144. Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv13
  145. Think you have a strong password?
  146. Google researcher reveals another Windows 0-day
  147. Zeus variants are back with a vengeance
  148. Scanner identifies malware strains, could be future of AV
  149. Linux/Cdorked Malware Attacking Some of the World’s Top Web Servers
  150. Google upgrading all SSL certificates to 2048-bit keys by end of 2013
  151. Only 36% of small firms apply security patches
  152. Apple patches security holes in QuickTime on Windows
  153. Power utilities claim 'daily' and 'constant' cyberattacks, says report
  154. Researchers find critical vulnerabilities in popular game engines
  155. US urged to permit self-defense retaliation on hackers
  156. Chinese hackers resume attacks on U.S. targets
  157. Cyber espionage campaign uses professionally-made malware
  158. Form-grabbing rootkit sold on underground forums
  159. Microsoft: Invulnerable software is not possible
  160. Info-stealing Dorkbot worm spreading on Facebook
  161. New Mac spyware signed with legitimate Apple Developer ID
  162. Windows Malware Techniques Spread to Android
  163. Internet Explorer best at blocking malware
  164. Speed Up PC Performance by Replacing Microsoft's Built-In Antivirus
  165. Adobe unleases critical patches for ColdFusion, Reader and Flash
  166. U.S. government tops list of malware buyers
  167. Microsoft security bulletin for may 14 2013
  168. Microsoft warns of new Trojan hijacking Facebook accounts
  169. Hackers breached Washington state court with Adobe ColdFusion flaw
  170. Google unveils 5-year roadmap for strong authentication
  171. Microsoft releases emergency patch for critical IE8 zero-day exploit
  172. How hackable is your password? McAfee offers password tips
  173. Possible Zero-Day Attack Today.
  174. PSA: Call of Duty: Ghosts “beta invite” imposter websites on the prowl
  175. Cyberattack affected US defense contractor over three-year period
  176. IE8 zero-day flaw targets U.S. nuke researchers
  177. ICS-CERT Revises Recommendations to Avoid Shamoon Infections
  178. Multi-stage exploit attacks for more effective malware delivery
  179. Which companies help protect your data from the government?
  180. Vulnerability in Internet Explorer Could Allow Remote Code Execution
  181. An important update regarding Norton Ghost™
  182. Adobe confirms 'leaky PDF' flaw, fix due on 14 May
  183. Feds want to expand wiretap law from ISPs to Google, Facebook
  184. Mozilla: Protecting our brand from a global spyware provider
  185. Kaspersky founder warns nations face growing cyberattack threats
  186. Does Java 8 Delay Mean Oracle Finally Serious about Security?
  187. Hacking suspect arrested for 'biggest cyberattack in history'
  188. S. Korea tops Asia's malware infection list
  189. Alert: Skype account hijack technique may affect all users
  190. Exploding the urban myths about how to stay safe online
  191. Recently patched Java flaw already targeted in mass attacks
  192. 'Ransomware' tricks victims into paying hefty fines
  193. Malware C&C Servers Found in 184 Countries
  194. Java Sandbox Bypass Discovered that Breaks Latest Update
  195. Introducing the Secunia Country Reports
  196. Latest Security Intelligence Report Shows 24% of PCs are Unprotected
  197. Beware of fake SourceForge site offering malicious downloads
  198. New version of Gozi financial malware bundles MBR rootkit
  199. “BadNews” malware in Google Play downloaded up to 9 million times
  200. WordPress attack highlights 30 million targets
  201. ‘Magic’ Espionage Malware hits Thousands of UK Computers
  202. Antivirus Fails 1 in 500 PCs
  203. Oracle takes a leaf out of Microsoft’s book, prioritizes Java security
  204. Just how much malware is on free porn sites?
  205. Most corporate computers missing critical software updates
  206. Study: 32.8 Million Android Phones Infected with Malware
  207. Flawed Malwarebytes security update wipes out thousands of computers
  208. First anti-malware product for UEFI
  209. Chrome Download Warnings Target Malicious Binaries
  210. Top Wi-Fi routers easy to hack, says study
  211. Steve Gibson's Fingerprint service detects SSL man in the middle
  212. Oracle to release 128 security patches, hundreds of products affected
  213. Malwarebytes Update causes Massive false positives.
  214. 'Winnti' Malware Targeting Online Gaming Firms
  215. Common security flaws leave applications open to amateur hackers
  216. Shylock Trojan aims for global targets, Symantec warns
  217. McAfee, NIST partner to boost U.S. cyberdefenses
  218. Huge attack on WordPress sites could spawn never-before-seen super bot
  219. Data-Stealing Spyware Redpill Back, Targeting India
  220. Anatomy of an exploit - Linksys router remote password change hole
  221. Bing serves up more malicious sites than Google, report says
  222. Latest from AV Comparatives
  223. Adobe patches Flash, Shockwave and ColdFusion
  224. Serious Vulnerabilities Found in Popular Home Wireless Routers
  225. Are You a Zombie? How to Check for Open DNS Resolvers
  226. Microsoft security bulletin for April 9 2013
  227. Someone, somewhere is injecting banner ads into webpages on the sly.
  228. Sneaky malware hides behind mouse movement, experts say
  229. Skype Malware Stealing Victims' Processing Power to Mine Bitcoins
  230. AMI Firmware Source Code, Private Key Leaked
  231. Shylock Trojan Going Global with New Features,Resilient Infrastructure
  232. Ransomware scares victims with child sex abuse images
  233. Ransomware boosts credibility by reading victims' browsers
  234. Honeypot Stings Attackers With Counterattacks
  235. Researchers find new point-of-sale malware called BlackPOS
  236. Did the spam cyber fight really slow down the Internet?
  237. Internet 'bystanders' affected as massive cyberattack hits Spamhaus
  238. Outdated Java weak spots are widespread, Websense says
  239. Boring Malware Sneaks By Antivirus Sandboxing
  240. Practicing safe DNS with Google
  241. Rootkit coders beware: Malwarebytes is in hot pursuit
  242. Secunia Vulnerability Review 2013
  243. Has HTTPS finally been cracked?
  244. New Trojan Malware Encrypts All Files, Demands Ransom
  245. Ramnit Malware Back and Better at Avoiding Detection
  246. New ZeuS-based modular rootkit offered to cybercriminals
  247. Reckless IT pros are missing security holes in non-Microsoft software
  248. Settlement Finally Reached
  249. Mac malware that infected Facebook bypassed OS X Gatekeeper protection
  250. Microsoft's latest patches squash potential USB hijack