PDA

View Full Version : Security News


Pages : 1 2 [3] 4 5 6 7 8 9 10

  1. Twitter fixes 'rare' bug that made protected accounts readable
  2. New crimeware tool Dendroid makes it easier to create Android malware
  3. Web ads eclipse porn as leading source of mobile malware
  4. Pre-installed malware found on new Android phones
  5. Report: Half of all exploits target Java
  6. Microsoft Security Bulletin Advance Notification for March 11th 2014
  7. Attack campaign compromises 300,000 home routers, alters DNS settings
  8. Our brains work hard to spot phishing scams, but still often fail
  9. Critical crypto bug leaves Linux, hundreds of apps open to eavesdrop..
  10. Google Fixes Nearly 20 Bugs in Chrome 33
  11. Scareware pusher loses appeal against epic $163 million fine
  12. 40 percent of Cryptolocker victims pay the ransom
  13. RSAC: Is Someone Watching Every Time You Touch Your Smartphone?
  14. How to turn a phone into a covert bugging device? Infect the printer
  15. Notorious "Gameover" malware gets itself a kernel-mode rootkit...
  16. How to keep your PC secure when Microsoft ends Windows XP support
  17. Netflix Scam
  18. Do Sentences Make Better Passwords?
  19. Security 2014: The holes are in the apps, not the operating systems
  20. Fake PayPal “Survey Program” Email Wants Card Details
  21. Android Botnets Hop on the TOR Train
  22. A close look at a targeted attack delivery
  23. How to rescue your PC from ransomware
  24. Study: IRS exposing Social Security numbers online
  25. Banking Trojans emerge as dominant mobile malware threat
  26. RSAC: Can Windows Updates Protect Against Malware?
  27. Announcing Enhanced Mitigation Experience Toolkit (EMET) 5.0 Preview
  28. Attack code bypasses Microsoft zero-day protection software
  29. Crypto weaknesses in WhatsApp “the kind of stuff the NSA would love”
  30. 'Major flaw' in Apple software leaves mobile devices vulerable to hack
  31. First-rate phishing email claims "Your Paypal transaction was declined
  32. Cyberattacks fallout could cost the global economy $3 trillion by 2020
  33. The simple way to stop serious Microsoft software flaws?
  34. Malware-infected Android apps spike in the Google Play store
  35. Iranians hacked Navy network for four months? Not a surprise.
  36. Belkin Fixes WeMo Vulnerabilities With Firmware Update
  37. Again - Adobe patches zero-day Flash flaw
  38. Twitter starts rolling out HTTPS by default - good news for security a
  39. Microsoft Security Advisory (2934088) IE9,10
  40. Hiding in plain sight: a story about a sneaky banking Trojan
  41. Dear Asus router user: You’ve been pwned, thanks to easily exploited..
  42. Attackers scanning for Symantec Endpoint Protection Manager flaw
  43. Kaspersky Lab Confirms Hidden Threat in BIOSes of Popular Laptops...
  44. Update: Third of Internet Explorer users at risk from attacks
  45. The sad state of cyber security readiness
  46. Bogus Microsoft "Reactivate Your Email Account" emails doing rounds
  47. Microsoft enters into new global partnerships in fight against...
  48. New Internet Explorer 10 zero-day exploit targets U.S. military
  49. 10 tips for spotting a phishing email
  50. Adobe Patches Critical Vulnerabilities in Shockwave
  51. Have a Linksys router? Now's a good time to update that firmware
  52. Record 12.8 billion cyberattacks seen in Japan last year
  53. "The Mask" Espionage Malware
  54. Record-Breaking DDoS Attack Nears 400 Gbps
  55. 2013 Microsoft Computing Safety Index
  56. New Ransomware Blocks Your DNS Connection, Mines Bitcoins
  57. New Flash exploit used to distribute credential-stealing malware
  58. How to Call Ransomware's Bluff
  59. Microsoft Security Bulletin Advance Notification for February 11 2014
  60. iFrame attack injects code via PNGs
  61. Adobe issues emergency Flash update for Windows and Mac
  62. Chrome to warn of possible settings hijack
  63. The Risk inside your credit card
  64. More card-stealing malware found
  65. Yahoo Detects Mass Hack Attempt On Yahoo Mail, Resets All Affected PWs
  66. Fully functional trojanized FileZilla client steals FTP logins
  67. VPN bypass vulnerability affects Android Jelly Bean and KitKat
  68. Cross-Platform Java bot found
  69. Malware infects Android-run devices via PCs
  70. Chrome Bugs Allow Sites to Listen to Your Private Conversations
  71. Scientists detect “spoiled onions” trying to sabotage Tor
  72. Hackers access 16 million email accounts in Germany
  73. Israeli Android researchers demo VPN vulnerability
  74. Changes in Windows Authenticode Signature Verification [Dec 13, 2013]
  75. Cyber attack that sent 750k malicious emails traced to hacked fridge
  76. Israeli security startup brings 'thinking' firewall to enterprise
  77. Nearly HALF of South Korea hacked in insider data theft
  78. Adware vendors buy Chrome Extensions to send ad- and malware-filled
  79. Six more U.S. retailers hit by Target-like hacks
  80. Neverquest Trojan: Built to Steal from Hundreds of Banks
  81. Microsoft closes Office 365 admin access vulnerability
  82. bleepingcomputer CryptoLocker Ransomware Information Guide and FAQ
  83. After hack, Target offers year of free credit monitoring
  84. A First Look at the Target Intrusion, Malware
  85. Explosive growth of advanced attacks and malicious traffic
  86. Target's data breach: No, really. It gets even worse.
  87. Amazon and GoDaddy are the biggest malware hosters
  88. TrueCrypt Master Key Extraction And Volume Identification
  89. AV vendors will deliver Windows XP anti-malware signatures for years
  90. Microsoft antimalware support for Windows XP
  91. Improperly Issued Digital Certificates Could Allow Spoofing
  92. Microsoft Kills MSE for XP
  93. Default settings leave external hard drives connected to Asus routers
  94. Yahoo malware turned European computers into bitcoin slaves
  95. Target data breach exposes serious threat of POS malware and botnets
  96. Oracle to patch Java, other products Tuesday
  97. Microsoft Security Bulletin Advance Notification for January 14th 2014
  98. $100 malware kit lets anyone build their own CryptoLocker
  99. Intel kills off McAfee Security brand
  100. Hackers easily hijack Windows crash reports, report says
  101. Trojan targeting World of Warcraft accounts
  102. Bad Ads on Yahoo Infected Thousands of Users With Malware
  103. Backdoor in wireless DSL routers lets attacker reset router, get admin
  104. CryptoLocker creeps lure victims with fake Adobe, Microsoft activation
  105. Snapchat hack affects 4.6 million users
  106. SD cards hacked
  107. Neverquest banking malware more dangerous than Zeus trojan
  108. Malware Protection metrics – November results
  109. Alert: Adobe License Key Email Scam
  110. Cryptolocker malware masterminds make around $30 million in 100 days
  111. Tech threats abound beyond spam, malware during holidays
  112. Target: 40M card accounts may be breached
  113. What's the greatest security risk?
  114. Remote webcam activation without warning light confirmed: Johns Hopkin
  115. Effective new Trojan skims card info from widely used ATMs
  116. Cracking RSA 4096-bit encryption with a microphone
  117. Malwarebytes 2013 Threat Report
  118. Fake VPN Site Serves Up Keylogger
  119. Bogus AV program uses 12 stolen digital certificates...
  120. Latest AV Comparatives results
  121. Hacking The Zero-Day Vulnerability Market
  122. Security Professionals: Top Cyber Threat Predictions for 2014
  123. Firms Eliminate Embedded Code To Foil Targeted Attacks
  124. Gmail Image Proxy Change Has Privacy, Security Implications
  125. Cryptolocker: Menace of 2013
  126. 64-Bit Version of Zeus Banking Trojan In The Wild
  127. The five most dangerous email subjects to watch for
  128. Dozens of zero-day flaws exist for exploit daily, report says
  129. PDF, Flash, and Java: the Most Dangerous File Types
  130. Improperly Issued Digital Certificates Could Allow Spoofing
  131. Microsoft, the FBI, Europol disrupt the notorious ZeroAccess botnet
  132. Researchers discover database with 2M stolen login credentials
  133. The biggest malware, security threats in 2013
  134. Credit card fraud comes of age with advances in point-of-sale botnets
  135. Scientist-developed malware covertly jumps air gaps...
  136. At it again with the phishing messages from MS
  137. Forensics Method Quickly Identifies CryptoLocker Encrypted Files
  138. Bitcoin’s skyrocketing value ushers in era of $1 million hacker heists
  139. 'Neverquest' trojan threatens online banking users
  140. Microsoft: Our protection metrics – October results
  141. Symantec: 'Blackshades' malware still being sold
  142. CryptoLocker gang teams with botnet-builders on ransomware
  143. Cryptolocker lowers ransom demands as Bitcoin price surges
  144. Android, Bitcoin top malware targets, McAfee reports
  145. Cops pay Crylock ransom...
  146. LG smart TV snooping extends to home networks, second blogger says
  147. Microsoft Bringing Message Encryption To Office 365 In Early 2014
  148. New backdoor worm found attacking websites running Apache Tomcat
  149. Warning! Targeted Internet misdirection on the rise
  150. Google strengthens its SSL configuration against possible attacks
  151. Netflix users in danger of unknowingly picking up malware
  152. Backup the best defense against (Cri)locked files
  153. Mobile malware reported riding on Google messaging service
  154. Exclusive: FBI warns of U.S. government breaches by Anonymous hackers
  155. “We still don’t encrypt server-to-server data,” admits Microsoft
  156. UK Police warn SERIOUS RANSOMWARE attack against UK users
  157. Cybercriminals target Silverlight browser plug-in users
  158. Researchers hack Internet Explorer 11 and Chrome at Mobile Pwn2Own
  159. Microsoft: IE Patch Tuesday vulnerabilities not actually patched
  160. Microsoft pushes crypto standards forward
  161. Microsoft unveils Cybercrime Center to tackle malware, botnets, etc...
  162. The Enhanced Mitigation Experience Toolkit v4.1
  163. MSRT November 2013 - Napolar
  164. Even the space station has been infected by malware, claims Kaspersky
  165. New IE zero-day attack reported
  166. Chrome To Start Rejecting Extensions From Outside The Chrome Store
  167. Security researcher says new malware can affect your BIOS
  168. Security's weakest link: Technology no match for social engineering
  169. Chrome Protecting Windows users from malicious extensions
  170. Spike in traffic with TCP source port zero has researchers worried
  171. Secunia Country Reports
  172. Vulnerability in Microsoft Graphics Component Could Allow Remote Code
  173. Upatre: Emerging Up(d)at(er) in the wild
  174. Google Chrome Adds Malware Blocker
  175. New Injection Campaign Peddling Rogue Software Downloads
  176. Has Microsoft just PROVED why you should upgrade from XP?
  177. Microsoft won’t turn on Windows Defender for unprotected PCs
  178. Microsoft may end antivirus updates on XP in April
  179. New cybersecurity report details risk of running unsupported software
  180. Adobe security breach actually affected closer to 38 million users
  181. Microsoft malware protection metrics - September results
  182. Hackers compromise official PHP website, infect visitors with malware
  183. Why you should not use autocomplete
  184. Application-layer DDoS attacks are becoming increasingly sophisticated
  185. Dirty Dozen spam sending nations - find where you finished
  186. Malwarebytes released for Android
  187. Malcovery Security: The company spammers and phishers hate
  188. D-Link Router backdoor vulnerability discovered
  189. How your identity gets swiped even if you're careful
  190. Nordstrom Finds Cash Register Skimmers
  191. Google May Feature You In An Ad With 'Shared Endorsements'
  192. Redirect hides browser extension
  193. 5 Wi-Fi security myths you must abandon now
  194. Our commitment to Microsoft antimalware
  195. pcworld: threats via a compromised webcam
  196. Trend Micro Acquires Broadweb
  197. Adobe's first update since the Big Breach - RoboHelp, Acrobat and Read
  198. Microsoft awards $100,000 to researcher for attack technique
  199. Phone charger can place user on malware alert
  200. New proof-of-concept tool detects stealthy malware hiding in graphics
  201. Massive Compromise of Adobe Source Code
  202. Three new attacks using IE zero-day exploit
  203. Microsoft Security Bulletin Advance Notification for October 8th 2013
  204. Hidden click fraud botnet uncovered
  205. Malicious browser extensions pose a serious threat and defenses are...
  206. F-Secure just released its Threat Report for first half of 2013
  207. Shylock Financial Malware Back and Targeting Two Dozen Major Banks
  208. Security researchers create undetectable hardware trojans
  209. Revoyem Ransomware Sinks to New Low
  210. Surreptitiously Tampering with Computer Chips
  211. Vulnerability in Internet Explorer Could Allow Remote Code Execution
  212. Oracle finally adds whitelisting capabilities to Java
  213. Security of Java takes a dangerous turn for the worse, experts say
  214. Firefox OS likely to face HTML5, Boot-to-Gecko attacks
  215. Shame on you! Report: Users lazier than ever about security practices
  216. Microsoft security bulletin for September 10 2013
  217. New advanced banking Trojan in the wild
  218. First case of Android Trojan spreading via mobile botnets discovered
  219. MS Security Bulletin Advance Notification for September 5th 2013
  220. NetTraveler Variant Adds Java Exploits, Watering Hole Attacks...
  221. Unpatched Mac bug gives attackers “super user” status
  222. Java 6 users vulnerable to zero day flaw, security experts warn
  223. Malicious Chrome extensions on the rise
  224. ESET reports trojan in Orbit Downloader
  225. Why does Malwarebytes keep flagging my favorite sites as malware?
  226. Microsoft predicts bleak future for XP users after patches run out
  227. Android becomes Windows' equal as a target for hackers
  228. Apple Store's malware problem exposed by researchers
  229. Security Researcher Hacks Mark Zuckerberg’s Wall To Prove His Exploit
  230. LastPass password manager gets security patch against password leakage
  231. The professionalization of malware
  232. Web servers are hackers’ target of choice
  233. XP's retirement will be hacker heaven
  234. Microsoft security bulletin for August 13 2013
  235. “Hand of Thief” banking trojan doesn’t do Windows—but it does Linux
  236. Chrome password security issue stirs debate
  237. New strain of ransomware evades detection by AV apps
  238. Windows Phones open to hackers when connecting to rogue Wi-Fi
  239. Wi-Fi routers: More security risks than ever
  240. Researchers demo exploits that bypass Windows 8 Secure Boot
  241. Boffins: We have FOOLED APPLE with malware app
  242. Canonical bares breach details as Apple continues security silence
  243. Chrome, Firefox users targeted with account-hijacking plugins
  244. Facebook pushes all users onto more secure connection by default
  245. XKeyscore NSA tool uncovered, collects pretty much the whole internet
  246. USB flash drives masquerading as keyboards
  247. Feds tell Web firms to turn over user account passwords
  248. Smishing: A Serious Identity Theft Scheme
  249. Android malware samples jump six-fold in Q2
  250. Equal-opportunity malware targets Macs and Windows