View Full Version : Security News

Pages : 1 2 [3] 4 5 6 7 8 9

  1. Microsoft Security Bulletin Advance Notification for January 14th 2014
  2. $100 malware kit lets anyone build their own CryptoLocker
  3. Intel kills off McAfee Security brand
  4. Hackers easily hijack Windows crash reports, report says
  5. Trojan targeting World of Warcraft accounts
  6. Bad Ads on Yahoo Infected Thousands of Users With Malware
  7. Backdoor in wireless DSL routers lets attacker reset router, get admin
  8. CryptoLocker creeps lure victims with fake Adobe, Microsoft activation
  9. Snapchat hack affects 4.6 million users
  10. SD cards hacked
  11. Neverquest banking malware more dangerous than Zeus trojan
  12. Malware Protection metrics – November results
  13. Alert: Adobe License Key Email Scam
  14. Cryptolocker malware masterminds make around $30 million in 100 days
  15. Tech threats abound beyond spam, malware during holidays
  16. Target: 40M card accounts may be breached
  17. What's the greatest security risk?
  18. Remote webcam activation without warning light confirmed: Johns Hopkin
  19. Effective new Trojan skims card info from widely used ATMs
  20. Cracking RSA 4096-bit encryption with a microphone
  21. Malwarebytes 2013 Threat Report
  22. Fake VPN Site Serves Up Keylogger
  23. Bogus AV program uses 12 stolen digital certificates...
  24. Latest AV Comparatives results
  25. Hacking The Zero-Day Vulnerability Market
  26. Security Professionals: Top Cyber Threat Predictions for 2014
  27. Firms Eliminate Embedded Code To Foil Targeted Attacks
  28. Gmail Image Proxy Change Has Privacy, Security Implications
  29. Cryptolocker: Menace of 2013
  30. 64-Bit Version of Zeus Banking Trojan In The Wild
  31. The five most dangerous email subjects to watch for
  32. Dozens of zero-day flaws exist for exploit daily, report says
  33. PDF, Flash, and Java: the Most Dangerous File Types
  34. Improperly Issued Digital Certificates Could Allow Spoofing
  35. Microsoft, the FBI, Europol disrupt the notorious ZeroAccess botnet
  36. Researchers discover database with 2M stolen login credentials
  37. The biggest malware, security threats in 2013
  38. Credit card fraud comes of age with advances in point-of-sale botnets
  39. Scientist-developed malware covertly jumps air gaps...
  40. At it again with the phishing messages from MS
  41. Forensics Method Quickly Identifies CryptoLocker Encrypted Files
  42. Bitcoin’s skyrocketing value ushers in era of $1 million hacker heists
  43. 'Neverquest' trojan threatens online banking users
  44. Microsoft: Our protection metrics – October results
  45. Symantec: 'Blackshades' malware still being sold
  46. CryptoLocker gang teams with botnet-builders on ransomware
  47. Cryptolocker lowers ransom demands as Bitcoin price surges
  48. Android, Bitcoin top malware targets, McAfee reports
  49. Cops pay Crylock ransom...
  50. LG smart TV snooping extends to home networks, second blogger says
  51. Microsoft Bringing Message Encryption To Office 365 In Early 2014
  52. New backdoor worm found attacking websites running Apache Tomcat
  53. Warning! Targeted Internet misdirection on the rise
  54. Google strengthens its SSL configuration against possible attacks
  55. Netflix users in danger of unknowingly picking up malware
  56. Backup the best defense against (Cri)locked files
  57. Mobile malware reported riding on Google messaging service
  58. Exclusive: FBI warns of U.S. government breaches by Anonymous hackers
  59. “We still don’t encrypt server-to-server data,” admits Microsoft
  60. UK Police warn SERIOUS RANSOMWARE attack against UK users
  61. Cybercriminals target Silverlight browser plug-in users
  62. Researchers hack Internet Explorer 11 and Chrome at Mobile Pwn2Own
  63. Microsoft: IE Patch Tuesday vulnerabilities not actually patched
  64. Microsoft pushes crypto standards forward
  65. Microsoft unveils Cybercrime Center to tackle malware, botnets, etc...
  66. The Enhanced Mitigation Experience Toolkit v4.1
  67. MSRT November 2013 - Napolar
  68. Even the space station has been infected by malware, claims Kaspersky
  69. New IE zero-day attack reported
  70. Chrome To Start Rejecting Extensions From Outside The Chrome Store
  71. Security researcher says new malware can affect your BIOS
  72. Security's weakest link: Technology no match for social engineering
  73. Chrome Protecting Windows users from malicious extensions
  74. Spike in traffic with TCP source port zero has researchers worried
  75. Secunia Country Reports
  76. Vulnerability in Microsoft Graphics Component Could Allow Remote Code
  77. Upatre: Emerging Up(d)at(er) in the wild
  78. Google Chrome Adds Malware Blocker
  79. New Injection Campaign Peddling Rogue Software Downloads
  80. Has Microsoft just PROVED why you should upgrade from XP?
  81. Microsoft won’t turn on Windows Defender for unprotected PCs
  82. Microsoft may end antivirus updates on XP in April
  83. New cybersecurity report details risk of running unsupported software
  84. Adobe security breach actually affected closer to 38 million users
  85. Microsoft malware protection metrics - September results
  86. Hackers compromise official PHP website, infect visitors with malware
  87. Why you should not use autocomplete
  88. Application-layer DDoS attacks are becoming increasingly sophisticated
  89. Dirty Dozen spam sending nations - find where you finished
  90. Malwarebytes released for Android
  91. Malcovery Security: The company spammers and phishers hate
  92. D-Link Router backdoor vulnerability discovered
  93. How your identity gets swiped even if you're careful
  94. Nordstrom Finds Cash Register Skimmers
  95. Google May Feature You In An Ad With 'Shared Endorsements'
  96. Redirect hides browser extension
  97. 5 Wi-Fi security myths you must abandon now
  98. Our commitment to Microsoft antimalware
  99. pcworld: threats via a compromised webcam
  100. Trend Micro Acquires Broadweb
  101. Adobe's first update since the Big Breach - RoboHelp, Acrobat and Read
  102. Microsoft awards $100,000 to researcher for attack technique
  103. Phone charger can place user on malware alert
  104. New proof-of-concept tool detects stealthy malware hiding in graphics
  105. Massive Compromise of Adobe Source Code
  106. Three new attacks using IE zero-day exploit
  107. Microsoft Security Bulletin Advance Notification for October 8th 2013
  108. Hidden click fraud botnet uncovered
  109. Malicious browser extensions pose a serious threat and defenses are...
  110. F-Secure just released its Threat Report for first half of 2013
  111. Shylock Financial Malware Back and Targeting Two Dozen Major Banks
  112. Security researchers create undetectable hardware trojans
  113. Revoyem Ransomware Sinks to New Low
  114. Surreptitiously Tampering with Computer Chips
  115. Vulnerability in Internet Explorer Could Allow Remote Code Execution
  116. Oracle finally adds whitelisting capabilities to Java
  117. Security of Java takes a dangerous turn for the worse, experts say
  118. Firefox OS likely to face HTML5, Boot-to-Gecko attacks
  119. Shame on you! Report: Users lazier than ever about security practices
  120. Microsoft security bulletin for September 10 2013
  121. New advanced banking Trojan in the wild
  122. First case of Android Trojan spreading via mobile botnets discovered
  123. MS Security Bulletin Advance Notification for September 5th 2013
  124. NetTraveler Variant Adds Java Exploits, Watering Hole Attacks...
  125. Unpatched Mac bug gives attackers “super user” status
  126. Java 6 users vulnerable to zero day flaw, security experts warn
  127. Malicious Chrome extensions on the rise
  128. ESET reports trojan in Orbit Downloader
  129. Why does Malwarebytes keep flagging my favorite sites as malware?
  130. Microsoft predicts bleak future for XP users after patches run out
  131. Android becomes Windows' equal as a target for hackers
  132. Apple Store's malware problem exposed by researchers
  133. Security Researcher Hacks Mark Zuckerberg’s Wall To Prove His Exploit
  134. LastPass password manager gets security patch against password leakage
  135. The professionalization of malware
  136. Web servers are hackers’ target of choice
  137. XP's retirement will be hacker heaven
  138. Microsoft security bulletin for August 13 2013
  139. “Hand of Thief” banking trojan doesn’t do Windows—but it does Linux
  140. Chrome password security issue stirs debate
  141. New strain of ransomware evades detection by AV apps
  142. Windows Phones open to hackers when connecting to rogue Wi-Fi
  143. Wi-Fi routers: More security risks than ever
  144. Researchers demo exploits that bypass Windows 8 Secure Boot
  145. Boffins: We have FOOLED APPLE with malware app
  146. Canonical bares breach details as Apple continues security silence
  147. Chrome, Firefox users targeted with account-hijacking plugins
  148. Facebook pushes all users onto more secure connection by default
  149. XKeyscore NSA tool uncovered, collects pretty much the whole internet
  150. USB flash drives masquerading as keyboards
  151. Feds tell Web firms to turn over user account passwords
  152. Smishing: A Serious Identity Theft Scheme
  153. Android malware samples jump six-fold in Q2
  154. Equal-opportunity malware targets Macs and Windows
  155. Apple Developer portal breach credited to security researcher
  156. SIM card has finally been hacked: Billions of phones at risk
  157. Cyberattacks account for up to $1 trillion in global losses
  158. Unusual file-infecting malware steals FTP credentials
  159. New vulnerability in Java 7 opens door to 10-year-old attack
  160. Android's very real 'Master Key' vulnerability
  161. How to tackle JavaScript-based ransomware sites
  162. IT security spend up, but in the wrong places, Oracle says
  163. How Microsoft handed the NSA access to encrypted messages
  164. Here's what an eavesdropper sees when you use an unsecured Wi-Fi hotsp
  165. New disk wiper malware linked to attacks in South Korea
  166. Uncovering Android Master Key That Makes 99% of Devices Vulnerable
  167. Vobfus and Beebone: Two computer viruses team up to infect computers
  168. Ubisoft warns millions of video gamers of hack attack
  169. Malwarebytes Revisits Geolocation Metadata In Our Toys
  170. Anatomy of a browser trick - you've heard of "clickjacking", now meet
  171. Six Percent of Free Android Apps Hide Intrusive Adware
  172. Most Internet users have fallen victim to malware
  173. Opera developers explain why malicious "update" wasn't detected
  174. Hard drive-wiping malware part of new wave of threats targeting SKorea
  175. Leak of powerful malware tool like “handing a bazooka to a child”
  176. One-click/key attack forces IE and Chrome to execute malicious code
  177. Facebook leaks are a lot leakier than Facebook is letting on
  178. Fake BlackBerry Messaging App Tricks 100,000 Android Users
  179. Opera breached, has code cert stolen, possibly spreads malware - advic
  180. Mobile malware grows by 614 percent in last year
  181. Vast majority of malware attacks spawned from legit sites
  182. Google adds malware site flags to Transparency Report
  183. Stanford, Mozilla, Opera team up to tackle cookie privacy issues
  184. Malwarebytes unveils ExplotShield-based Anti-Exploit Beta
  185. Facebook bug exposed contact info of 6M users
  186. Microsoft Citadel botnet assault liberated 2 million PCs
  187. Microsoft unleashes bug bounty program — for betas, too
  188. Oracle to fix 40 holes in Java on Tuesday, 18 June 2013
  189. EMET 4.0 now available for download
  190. Latest from AV comparatives
  191. Malware masquerading as Bad Piggies found on Google Play
  192. Microsoft misses Google-found flaw in Patch Tuesday updates
  193. Microsoft security bulletin for June 11 2013
  194. Android trojan attempts to spread via Bluetooth
  195. Microsoft Security Bulletin Advance Notification for June 2013
  196. New leak shows feds can access user accounts for Google, Facebook...
  197. Malware increasingly uses peer-to-peer communications, researchers say
  198. Microsoft helps disrupt massive financial cybercrime ring
  199. Google beefs up the cash bounty for reporting vulnerabilities
  200. Apple's OS X and Safari get biggish security fixes
  201. Charger can hack Apple devices with ‘alarming ease’, researchers claim
  202. For the love of God, please secure your wireless networks
  203. Oracle reveals plans for Java security improvements
  204. Judge: FBI Doesn't Need a Warrant to Access Google Customer Data
  205. Carna Botnet Analysis Renders Scary Numbers on Vulnerable Devices
  206. Malware-splosion: 2013 Will be Malware's Biggest Year Ever
  207. Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv13
  208. Think you have a strong password?
  209. Google researcher reveals another Windows 0-day
  210. Zeus variants are back with a vengeance
  211. Scanner identifies malware strains, could be future of AV
  212. Linux/Cdorked Malware Attacking Some of the World’s Top Web Servers
  213. Google upgrading all SSL certificates to 2048-bit keys by end of 2013
  214. Only 36% of small firms apply security patches
  215. Apple patches security holes in QuickTime on Windows
  216. Power utilities claim 'daily' and 'constant' cyberattacks, says report
  217. Researchers find critical vulnerabilities in popular game engines
  218. US urged to permit self-defense retaliation on hackers
  219. Chinese hackers resume attacks on U.S. targets
  220. Cyber espionage campaign uses professionally-made malware
  221. Form-grabbing rootkit sold on underground forums
  222. Microsoft: Invulnerable software is not possible
  223. Info-stealing Dorkbot worm spreading on Facebook
  224. New Mac spyware signed with legitimate Apple Developer ID
  225. Windows Malware Techniques Spread to Android
  226. Internet Explorer best at blocking malware
  227. Speed Up PC Performance by Replacing Microsoft's Built-In Antivirus
  228. Adobe unleases critical patches for ColdFusion, Reader and Flash
  229. U.S. government tops list of malware buyers
  230. Microsoft security bulletin for may 14 2013
  231. Microsoft warns of new Trojan hijacking Facebook accounts
  232. Hackers breached Washington state court with Adobe ColdFusion flaw
  233. Google unveils 5-year roadmap for strong authentication
  234. Microsoft releases emergency patch for critical IE8 zero-day exploit
  235. How hackable is your password? McAfee offers password tips
  236. Possible Zero-Day Attack Today.
  237. PSA: Call of Duty: Ghosts “beta invite” imposter websites on the prowl
  238. Cyberattack affected US defense contractor over three-year period
  239. IE8 zero-day flaw targets U.S. nuke researchers
  240. ICS-CERT Revises Recommendations to Avoid Shamoon Infections
  241. Multi-stage exploit attacks for more effective malware delivery
  242. Which companies help protect your data from the government?
  243. Vulnerability in Internet Explorer Could Allow Remote Code Execution
  244. An important update regarding Norton Ghost™
  245. Adobe confirms 'leaky PDF' flaw, fix due on 14 May
  246. Feds want to expand wiretap law from ISPs to Google, Facebook
  247. Mozilla: Protecting our brand from a global spyware provider
  248. Kaspersky founder warns nations face growing cyberattack threats
  249. Does Java 8 Delay Mean Oracle Finally Serious about Security?
  250. Hacking suspect arrested for 'biggest cyberattack in history'