PDA

View Full Version : Security News


Pages : 1 2 [3] 4 5 6 7 8 9 10

  1. Cross-Platform Java bot found
  2. Malware infects Android-run devices via PCs
  3. Chrome Bugs Allow Sites to Listen to Your Private Conversations
  4. Scientists detect “spoiled onions” trying to sabotage Tor
  5. Hackers access 16 million email accounts in Germany
  6. Israeli Android researchers demo VPN vulnerability
  7. Changes in Windows Authenticode Signature Verification [Dec 13, 2013]
  8. Cyber attack that sent 750k malicious emails traced to hacked fridge
  9. Israeli security startup brings 'thinking' firewall to enterprise
  10. Nearly HALF of South Korea hacked in insider data theft
  11. Adware vendors buy Chrome Extensions to send ad- and malware-filled
  12. Six more U.S. retailers hit by Target-like hacks
  13. Neverquest Trojan: Built to Steal from Hundreds of Banks
  14. Microsoft closes Office 365 admin access vulnerability
  15. bleepingcomputer CryptoLocker Ransomware Information Guide and FAQ
  16. After hack, Target offers year of free credit monitoring
  17. A First Look at the Target Intrusion, Malware
  18. Explosive growth of advanced attacks and malicious traffic
  19. Target's data breach: No, really. It gets even worse.
  20. Amazon and GoDaddy are the biggest malware hosters
  21. TrueCrypt Master Key Extraction And Volume Identification
  22. AV vendors will deliver Windows XP anti-malware signatures for years
  23. Microsoft antimalware support for Windows XP
  24. Improperly Issued Digital Certificates Could Allow Spoofing
  25. Microsoft Kills MSE for XP
  26. Default settings leave external hard drives connected to Asus routers
  27. Yahoo malware turned European computers into bitcoin slaves
  28. Target data breach exposes serious threat of POS malware and botnets
  29. Oracle to patch Java, other products Tuesday
  30. Microsoft Security Bulletin Advance Notification for January 14th 2014
  31. $100 malware kit lets anyone build their own CryptoLocker
  32. Intel kills off McAfee Security brand
  33. Hackers easily hijack Windows crash reports, report says
  34. Trojan targeting World of Warcraft accounts
  35. Bad Ads on Yahoo Infected Thousands of Users With Malware
  36. Backdoor in wireless DSL routers lets attacker reset router, get admin
  37. CryptoLocker creeps lure victims with fake Adobe, Microsoft activation
  38. Snapchat hack affects 4.6 million users
  39. SD cards hacked
  40. Neverquest banking malware more dangerous than Zeus trojan
  41. Malware Protection metrics – November results
  42. Alert: Adobe License Key Email Scam
  43. Cryptolocker malware masterminds make around $30 million in 100 days
  44. Tech threats abound beyond spam, malware during holidays
  45. Target: 40M card accounts may be breached
  46. What's the greatest security risk?
  47. Remote webcam activation without warning light confirmed: Johns Hopkin
  48. Effective new Trojan skims card info from widely used ATMs
  49. Cracking RSA 4096-bit encryption with a microphone
  50. Malwarebytes 2013 Threat Report
  51. Fake VPN Site Serves Up Keylogger
  52. Bogus AV program uses 12 stolen digital certificates...
  53. Latest AV Comparatives results
  54. Hacking The Zero-Day Vulnerability Market
  55. Security Professionals: Top Cyber Threat Predictions for 2014
  56. Firms Eliminate Embedded Code To Foil Targeted Attacks
  57. Gmail Image Proxy Change Has Privacy, Security Implications
  58. Cryptolocker: Menace of 2013
  59. 64-Bit Version of Zeus Banking Trojan In The Wild
  60. The five most dangerous email subjects to watch for
  61. Dozens of zero-day flaws exist for exploit daily, report says
  62. PDF, Flash, and Java: the Most Dangerous File Types
  63. Improperly Issued Digital Certificates Could Allow Spoofing
  64. Microsoft, the FBI, Europol disrupt the notorious ZeroAccess botnet
  65. Researchers discover database with 2M stolen login credentials
  66. The biggest malware, security threats in 2013
  67. Credit card fraud comes of age with advances in point-of-sale botnets
  68. Scientist-developed malware covertly jumps air gaps...
  69. At it again with the phishing messages from MS
  70. Forensics Method Quickly Identifies CryptoLocker Encrypted Files
  71. Bitcoin’s skyrocketing value ushers in era of $1 million hacker heists
  72. 'Neverquest' trojan threatens online banking users
  73. Microsoft: Our protection metrics – October results
  74. Symantec: 'Blackshades' malware still being sold
  75. CryptoLocker gang teams with botnet-builders on ransomware
  76. Cryptolocker lowers ransom demands as Bitcoin price surges
  77. Android, Bitcoin top malware targets, McAfee reports
  78. Cops pay Crylock ransom...
  79. LG smart TV snooping extends to home networks, second blogger says
  80. Microsoft Bringing Message Encryption To Office 365 In Early 2014
  81. New backdoor worm found attacking websites running Apache Tomcat
  82. Warning! Targeted Internet misdirection on the rise
  83. Google strengthens its SSL configuration against possible attacks
  84. Netflix users in danger of unknowingly picking up malware
  85. Backup the best defense against (Cri)locked files
  86. Mobile malware reported riding on Google messaging service
  87. Exclusive: FBI warns of U.S. government breaches by Anonymous hackers
  88. “We still don’t encrypt server-to-server data,” admits Microsoft
  89. UK Police warn SERIOUS RANSOMWARE attack against UK users
  90. Cybercriminals target Silverlight browser plug-in users
  91. Researchers hack Internet Explorer 11 and Chrome at Mobile Pwn2Own
  92. Microsoft: IE Patch Tuesday vulnerabilities not actually patched
  93. Microsoft pushes crypto standards forward
  94. Microsoft unveils Cybercrime Center to tackle malware, botnets, etc...
  95. The Enhanced Mitigation Experience Toolkit v4.1
  96. MSRT November 2013 - Napolar
  97. Even the space station has been infected by malware, claims Kaspersky
  98. New IE zero-day attack reported
  99. Chrome To Start Rejecting Extensions From Outside The Chrome Store
  100. Security researcher says new malware can affect your BIOS
  101. Security's weakest link: Technology no match for social engineering
  102. Chrome Protecting Windows users from malicious extensions
  103. Spike in traffic with TCP source port zero has researchers worried
  104. Secunia Country Reports
  105. Vulnerability in Microsoft Graphics Component Could Allow Remote Code
  106. Upatre: Emerging Up(d)at(er) in the wild
  107. Google Chrome Adds Malware Blocker
  108. New Injection Campaign Peddling Rogue Software Downloads
  109. Has Microsoft just PROVED why you should upgrade from XP?
  110. Microsoft won’t turn on Windows Defender for unprotected PCs
  111. Microsoft may end antivirus updates on XP in April
  112. New cybersecurity report details risk of running unsupported software
  113. Adobe security breach actually affected closer to 38 million users
  114. Microsoft malware protection metrics - September results
  115. Hackers compromise official PHP website, infect visitors with malware
  116. Why you should not use autocomplete
  117. Application-layer DDoS attacks are becoming increasingly sophisticated
  118. Dirty Dozen spam sending nations - find where you finished
  119. Malwarebytes released for Android
  120. Malcovery Security: The company spammers and phishers hate
  121. D-Link Router backdoor vulnerability discovered
  122. How your identity gets swiped even if you're careful
  123. Nordstrom Finds Cash Register Skimmers
  124. Google May Feature You In An Ad With 'Shared Endorsements'
  125. Redirect hides browser extension
  126. 5 Wi-Fi security myths you must abandon now
  127. Our commitment to Microsoft antimalware
  128. pcworld: threats via a compromised webcam
  129. Trend Micro Acquires Broadweb
  130. Adobe's first update since the Big Breach - RoboHelp, Acrobat and Read
  131. Microsoft awards $100,000 to researcher for attack technique
  132. Phone charger can place user on malware alert
  133. New proof-of-concept tool detects stealthy malware hiding in graphics
  134. Massive Compromise of Adobe Source Code
  135. Three new attacks using IE zero-day exploit
  136. Microsoft Security Bulletin Advance Notification for October 8th 2013
  137. Hidden click fraud botnet uncovered
  138. Malicious browser extensions pose a serious threat and defenses are...
  139. F-Secure just released its Threat Report for first half of 2013
  140. Shylock Financial Malware Back and Targeting Two Dozen Major Banks
  141. Security researchers create undetectable hardware trojans
  142. Revoyem Ransomware Sinks to New Low
  143. Surreptitiously Tampering with Computer Chips
  144. Vulnerability in Internet Explorer Could Allow Remote Code Execution
  145. Oracle finally adds whitelisting capabilities to Java
  146. Security of Java takes a dangerous turn for the worse, experts say
  147. Firefox OS likely to face HTML5, Boot-to-Gecko attacks
  148. Shame on you! Report: Users lazier than ever about security practices
  149. Microsoft security bulletin for September 10 2013
  150. New advanced banking Trojan in the wild
  151. First case of Android Trojan spreading via mobile botnets discovered
  152. MS Security Bulletin Advance Notification for September 5th 2013
  153. NetTraveler Variant Adds Java Exploits, Watering Hole Attacks...
  154. Unpatched Mac bug gives attackers “super user” status
  155. Java 6 users vulnerable to zero day flaw, security experts warn
  156. Malicious Chrome extensions on the rise
  157. ESET reports trojan in Orbit Downloader
  158. Why does Malwarebytes keep flagging my favorite sites as malware?
  159. Microsoft predicts bleak future for XP users after patches run out
  160. Android becomes Windows' equal as a target for hackers
  161. Apple Store's malware problem exposed by researchers
  162. Security Researcher Hacks Mark Zuckerberg’s Wall To Prove His Exploit
  163. LastPass password manager gets security patch against password leakage
  164. The professionalization of malware
  165. Web servers are hackers’ target of choice
  166. XP's retirement will be hacker heaven
  167. Microsoft security bulletin for August 13 2013
  168. “Hand of Thief” banking trojan doesn’t do Windows—but it does Linux
  169. Chrome password security issue stirs debate
  170. New strain of ransomware evades detection by AV apps
  171. Windows Phones open to hackers when connecting to rogue Wi-Fi
  172. Wi-Fi routers: More security risks than ever
  173. Researchers demo exploits that bypass Windows 8 Secure Boot
  174. Boffins: We have FOOLED APPLE with malware app
  175. Canonical bares breach details as Apple continues security silence
  176. Chrome, Firefox users targeted with account-hijacking plugins
  177. Facebook pushes all users onto more secure connection by default
  178. XKeyscore NSA tool uncovered, collects pretty much the whole internet
  179. USB flash drives masquerading as keyboards
  180. Feds tell Web firms to turn over user account passwords
  181. Smishing: A Serious Identity Theft Scheme
  182. Android malware samples jump six-fold in Q2
  183. Equal-opportunity malware targets Macs and Windows
  184. Apple Developer portal breach credited to security researcher
  185. SIM card has finally been hacked: Billions of phones at risk
  186. Cyberattacks account for up to $1 trillion in global losses
  187. Unusual file-infecting malware steals FTP credentials
  188. New vulnerability in Java 7 opens door to 10-year-old attack
  189. Android's very real 'Master Key' vulnerability
  190. How to tackle JavaScript-based ransomware sites
  191. IT security spend up, but in the wrong places, Oracle says
  192. How Microsoft handed the NSA access to encrypted messages
  193. Here's what an eavesdropper sees when you use an unsecured Wi-Fi hotsp
  194. New disk wiper malware linked to attacks in South Korea
  195. Uncovering Android Master Key That Makes 99% of Devices Vulnerable
  196. Vobfus and Beebone: Two computer viruses team up to infect computers
  197. Ubisoft warns millions of video gamers of hack attack
  198. Malwarebytes Revisits Geolocation Metadata In Our Toys
  199. Anatomy of a browser trick - you've heard of "clickjacking", now meet
  200. Six Percent of Free Android Apps Hide Intrusive Adware
  201. Most Internet users have fallen victim to malware
  202. Opera developers explain why malicious "update" wasn't detected
  203. Hard drive-wiping malware part of new wave of threats targeting SKorea
  204. Leak of powerful malware tool like “handing a bazooka to a child”
  205. One-click/key attack forces IE and Chrome to execute malicious code
  206. Facebook leaks are a lot leakier than Facebook is letting on
  207. Fake BlackBerry Messaging App Tricks 100,000 Android Users
  208. Opera breached, has code cert stolen, possibly spreads malware - advic
  209. Mobile malware grows by 614 percent in last year
  210. Vast majority of malware attacks spawned from legit sites
  211. Google adds malware site flags to Transparency Report
  212. Stanford, Mozilla, Opera team up to tackle cookie privacy issues
  213. Malwarebytes unveils ExplotShield-based Anti-Exploit Beta
  214. Facebook bug exposed contact info of 6M users
  215. Microsoft Citadel botnet assault liberated 2 million PCs
  216. Microsoft unleashes bug bounty program — for betas, too
  217. Oracle to fix 40 holes in Java on Tuesday, 18 June 2013
  218. EMET 4.0 now available for download
  219. Latest from AV comparatives
  220. Malware masquerading as Bad Piggies found on Google Play
  221. Microsoft misses Google-found flaw in Patch Tuesday updates
  222. Microsoft security bulletin for June 11 2013
  223. Android trojan attempts to spread via Bluetooth
  224. Microsoft Security Bulletin Advance Notification for June 2013
  225. New leak shows feds can access user accounts for Google, Facebook...
  226. Malware increasingly uses peer-to-peer communications, researchers say
  227. Microsoft helps disrupt massive financial cybercrime ring
  228. Google beefs up the cash bounty for reporting vulnerabilities
  229. Apple's OS X and Safari get biggish security fixes
  230. Charger can hack Apple devices with ‘alarming ease’, researchers claim
  231. For the love of God, please secure your wireless networks
  232. Oracle reveals plans for Java security improvements
  233. Judge: FBI Doesn't Need a Warrant to Access Google Customer Data
  234. Carna Botnet Analysis Renders Scary Numbers on Vulnerable Devices
  235. Malware-splosion: 2013 Will be Malware's Biggest Year Ever
  236. Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv13
  237. Think you have a strong password?
  238. Google researcher reveals another Windows 0-day
  239. Zeus variants are back with a vengeance
  240. Scanner identifies malware strains, could be future of AV
  241. Linux/Cdorked Malware Attacking Some of the World’s Top Web Servers
  242. Google upgrading all SSL certificates to 2048-bit keys by end of 2013
  243. Only 36% of small firms apply security patches
  244. Apple patches security holes in QuickTime on Windows
  245. Power utilities claim 'daily' and 'constant' cyberattacks, says report
  246. Researchers find critical vulnerabilities in popular game engines
  247. US urged to permit self-defense retaliation on hackers
  248. Chinese hackers resume attacks on U.S. targets
  249. Cyber espionage campaign uses professionally-made malware
  250. Form-grabbing rootkit sold on underground forums