View Full Version : Security News

Pages : 1 2 [3] 4 5 6 7 8 9

  1. Even the space station has been infected by malware, claims Kaspersky
  2. New IE zero-day attack reported
  3. Chrome To Start Rejecting Extensions From Outside The Chrome Store
  4. Security researcher says new malware can affect your BIOS
  5. Security's weakest link: Technology no match for social engineering
  6. Chrome Protecting Windows users from malicious extensions
  7. Spike in traffic with TCP source port zero has researchers worried
  8. Secunia Country Reports
  9. Vulnerability in Microsoft Graphics Component Could Allow Remote Code
  10. Upatre: Emerging Up(d)at(er) in the wild
  11. Google Chrome Adds Malware Blocker
  12. New Injection Campaign Peddling Rogue Software Downloads
  13. Has Microsoft just PROVED why you should upgrade from XP?
  14. Microsoft won’t turn on Windows Defender for unprotected PCs
  15. Microsoft may end antivirus updates on XP in April
  16. New cybersecurity report details risk of running unsupported software
  17. Adobe security breach actually affected closer to 38 million users
  18. Microsoft malware protection metrics - September results
  19. Hackers compromise official PHP website, infect visitors with malware
  20. Why you should not use autocomplete
  21. Application-layer DDoS attacks are becoming increasingly sophisticated
  22. Dirty Dozen spam sending nations - find where you finished
  23. Malwarebytes released for Android
  24. Malcovery Security: The company spammers and phishers hate
  25. D-Link Router backdoor vulnerability discovered
  26. How your identity gets swiped even if you're careful
  27. Nordstrom Finds Cash Register Skimmers
  28. Google May Feature You In An Ad With 'Shared Endorsements'
  29. Redirect hides browser extension
  30. 5 Wi-Fi security myths you must abandon now
  31. Our commitment to Microsoft antimalware
  32. pcworld: threats via a compromised webcam
  33. Trend Micro Acquires Broadweb
  34. Adobe's first update since the Big Breach - RoboHelp, Acrobat and Read
  35. Microsoft awards $100,000 to researcher for attack technique
  36. Phone charger can place user on malware alert
  37. New proof-of-concept tool detects stealthy malware hiding in graphics
  38. Massive Compromise of Adobe Source Code
  39. Three new attacks using IE zero-day exploit
  40. Microsoft Security Bulletin Advance Notification for October 8th 2013
  41. Hidden click fraud botnet uncovered
  42. Malicious browser extensions pose a serious threat and defenses are...
  43. F-Secure just released its Threat Report for first half of 2013
  44. Shylock Financial Malware Back and Targeting Two Dozen Major Banks
  45. Security researchers create undetectable hardware trojans
  46. Revoyem Ransomware Sinks to New Low
  47. Surreptitiously Tampering with Computer Chips
  48. Vulnerability in Internet Explorer Could Allow Remote Code Execution
  49. Oracle finally adds whitelisting capabilities to Java
  50. Security of Java takes a dangerous turn for the worse, experts say
  51. Firefox OS likely to face HTML5, Boot-to-Gecko attacks
  52. Shame on you! Report: Users lazier than ever about security practices
  53. Microsoft security bulletin for September 10 2013
  54. New advanced banking Trojan in the wild
  55. First case of Android Trojan spreading via mobile botnets discovered
  56. MS Security Bulletin Advance Notification for September 5th 2013
  57. NetTraveler Variant Adds Java Exploits, Watering Hole Attacks...
  58. Unpatched Mac bug gives attackers “super user” status
  59. Java 6 users vulnerable to zero day flaw, security experts warn
  60. Malicious Chrome extensions on the rise
  61. ESET reports trojan in Orbit Downloader
  62. Why does Malwarebytes keep flagging my favorite sites as malware?
  63. Microsoft predicts bleak future for XP users after patches run out
  64. Android becomes Windows' equal as a target for hackers
  65. Apple Store's malware problem exposed by researchers
  66. Security Researcher Hacks Mark Zuckerberg’s Wall To Prove His Exploit
  67. LastPass password manager gets security patch against password leakage
  68. The professionalization of malware
  69. Web servers are hackers’ target of choice
  70. XP's retirement will be hacker heaven
  71. Microsoft security bulletin for August 13 2013
  72. “Hand of Thief” banking trojan doesn’t do Windows—but it does Linux
  73. Chrome password security issue stirs debate
  74. New strain of ransomware evades detection by AV apps
  75. Windows Phones open to hackers when connecting to rogue Wi-Fi
  76. Wi-Fi routers: More security risks than ever
  77. Researchers demo exploits that bypass Windows 8 Secure Boot
  78. Boffins: We have FOOLED APPLE with malware app
  79. Canonical bares breach details as Apple continues security silence
  80. Chrome, Firefox users targeted with account-hijacking plugins
  81. Facebook pushes all users onto more secure connection by default
  82. XKeyscore NSA tool uncovered, collects pretty much the whole internet
  83. USB flash drives masquerading as keyboards
  84. Feds tell Web firms to turn over user account passwords
  85. Smishing: A Serious Identity Theft Scheme
  86. Android malware samples jump six-fold in Q2
  87. Equal-opportunity malware targets Macs and Windows
  88. Apple Developer portal breach credited to security researcher
  89. SIM card has finally been hacked: Billions of phones at risk
  90. Cyberattacks account for up to $1 trillion in global losses
  91. Unusual file-infecting malware steals FTP credentials
  92. New vulnerability in Java 7 opens door to 10-year-old attack
  93. Android's very real 'Master Key' vulnerability
  94. How to tackle JavaScript-based ransomware sites
  95. IT security spend up, but in the wrong places, Oracle says
  96. How Microsoft handed the NSA access to encrypted messages
  97. Here's what an eavesdropper sees when you use an unsecured Wi-Fi hotsp
  98. New disk wiper malware linked to attacks in South Korea
  99. Uncovering Android Master Key That Makes 99% of Devices Vulnerable
  100. Vobfus and Beebone: Two computer viruses team up to infect computers
  101. Ubisoft warns millions of video gamers of hack attack
  102. Malwarebytes Revisits Geolocation Metadata In Our Toys
  103. Anatomy of a browser trick - you've heard of "clickjacking", now meet
  104. Six Percent of Free Android Apps Hide Intrusive Adware
  105. Most Internet users have fallen victim to malware
  106. Opera developers explain why malicious "update" wasn't detected
  107. Hard drive-wiping malware part of new wave of threats targeting SKorea
  108. Leak of powerful malware tool like “handing a bazooka to a child”
  109. One-click/key attack forces IE and Chrome to execute malicious code
  110. Facebook leaks are a lot leakier than Facebook is letting on
  111. Fake BlackBerry Messaging App Tricks 100,000 Android Users
  112. Opera breached, has code cert stolen, possibly spreads malware - advic
  113. Mobile malware grows by 614 percent in last year
  114. Vast majority of malware attacks spawned from legit sites
  115. Google adds malware site flags to Transparency Report
  116. Stanford, Mozilla, Opera team up to tackle cookie privacy issues
  117. Malwarebytes unveils ExplotShield-based Anti-Exploit Beta
  118. Facebook bug exposed contact info of 6M users
  119. Microsoft Citadel botnet assault liberated 2 million PCs
  120. Microsoft unleashes bug bounty program — for betas, too
  121. Oracle to fix 40 holes in Java on Tuesday, 18 June 2013
  122. EMET 4.0 now available for download
  123. Latest from AV comparatives
  124. Malware masquerading as Bad Piggies found on Google Play
  125. Microsoft misses Google-found flaw in Patch Tuesday updates
  126. Microsoft security bulletin for June 11 2013
  127. Android trojan attempts to spread via Bluetooth
  128. Microsoft Security Bulletin Advance Notification for June 2013
  129. New leak shows feds can access user accounts for Google, Facebook...
  130. Malware increasingly uses peer-to-peer communications, researchers say
  131. Microsoft helps disrupt massive financial cybercrime ring
  132. Google beefs up the cash bounty for reporting vulnerabilities
  133. Apple's OS X and Safari get biggish security fixes
  134. Charger can hack Apple devices with ‘alarming ease’, researchers claim
  135. For the love of God, please secure your wireless networks
  136. Oracle reveals plans for Java security improvements
  137. Judge: FBI Doesn't Need a Warrant to Access Google Customer Data
  138. Carna Botnet Analysis Renders Scary Numbers on Vulnerable Devices
  139. Malware-splosion: 2013 Will be Malware's Biggest Year Ever
  140. Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv13
  141. Think you have a strong password?
  142. Google researcher reveals another Windows 0-day
  143. Zeus variants are back with a vengeance
  144. Scanner identifies malware strains, could be future of AV
  145. Linux/Cdorked Malware Attacking Some of the World’s Top Web Servers
  146. Google upgrading all SSL certificates to 2048-bit keys by end of 2013
  147. Only 36% of small firms apply security patches
  148. Apple patches security holes in QuickTime on Windows
  149. Power utilities claim 'daily' and 'constant' cyberattacks, says report
  150. Researchers find critical vulnerabilities in popular game engines
  151. US urged to permit self-defense retaliation on hackers
  152. Chinese hackers resume attacks on U.S. targets
  153. Cyber espionage campaign uses professionally-made malware
  154. Form-grabbing rootkit sold on underground forums
  155. Microsoft: Invulnerable software is not possible
  156. Info-stealing Dorkbot worm spreading on Facebook
  157. New Mac spyware signed with legitimate Apple Developer ID
  158. Windows Malware Techniques Spread to Android
  159. Internet Explorer best at blocking malware
  160. Speed Up PC Performance by Replacing Microsoft's Built-In Antivirus
  161. Adobe unleases critical patches for ColdFusion, Reader and Flash
  162. U.S. government tops list of malware buyers
  163. Microsoft security bulletin for may 14 2013
  164. Microsoft warns of new Trojan hijacking Facebook accounts
  165. Hackers breached Washington state court with Adobe ColdFusion flaw
  166. Google unveils 5-year roadmap for strong authentication
  167. Microsoft releases emergency patch for critical IE8 zero-day exploit
  168. How hackable is your password? McAfee offers password tips
  169. Possible Zero-Day Attack Today.
  170. PSA: Call of Duty: Ghosts “beta invite” imposter websites on the prowl
  171. Cyberattack affected US defense contractor over three-year period
  172. IE8 zero-day flaw targets U.S. nuke researchers
  173. ICS-CERT Revises Recommendations to Avoid Shamoon Infections
  174. Multi-stage exploit attacks for more effective malware delivery
  175. Which companies help protect your data from the government?
  176. Vulnerability in Internet Explorer Could Allow Remote Code Execution
  177. An important update regarding Norton Ghost™
  178. Adobe confirms 'leaky PDF' flaw, fix due on 14 May
  179. Feds want to expand wiretap law from ISPs to Google, Facebook
  180. Mozilla: Protecting our brand from a global spyware provider
  181. Kaspersky founder warns nations face growing cyberattack threats
  182. Does Java 8 Delay Mean Oracle Finally Serious about Security?
  183. Hacking suspect arrested for 'biggest cyberattack in history'
  184. S. Korea tops Asia's malware infection list
  185. Alert: Skype account hijack technique may affect all users
  186. Exploding the urban myths about how to stay safe online
  187. Recently patched Java flaw already targeted in mass attacks
  188. 'Ransomware' tricks victims into paying hefty fines
  189. Malware C&C Servers Found in 184 Countries
  190. Java Sandbox Bypass Discovered that Breaks Latest Update
  191. Introducing the Secunia Country Reports
  192. Latest Security Intelligence Report Shows 24% of PCs are Unprotected
  193. Beware of fake SourceForge site offering malicious downloads
  194. New version of Gozi financial malware bundles MBR rootkit
  195. “BadNews” malware in Google Play downloaded up to 9 million times
  196. WordPress attack highlights 30 million targets
  197. ‘Magic’ Espionage Malware hits Thousands of UK Computers
  198. Antivirus Fails 1 in 500 PCs
  199. Oracle takes a leaf out of Microsoft’s book, prioritizes Java security
  200. Just how much malware is on free porn sites?
  201. Most corporate computers missing critical software updates
  202. Study: 32.8 Million Android Phones Infected with Malware
  203. Flawed Malwarebytes security update wipes out thousands of computers
  204. First anti-malware product for UEFI
  205. Chrome Download Warnings Target Malicious Binaries
  206. Top Wi-Fi routers easy to hack, says study
  207. Steve Gibson's Fingerprint service detects SSL man in the middle
  208. Oracle to release 128 security patches, hundreds of products affected
  209. Malwarebytes Update causes Massive false positives.
  210. 'Winnti' Malware Targeting Online Gaming Firms
  211. Common security flaws leave applications open to amateur hackers
  212. Shylock Trojan aims for global targets, Symantec warns
  213. McAfee, NIST partner to boost U.S. cyberdefenses
  214. Huge attack on WordPress sites could spawn never-before-seen super bot
  215. Data-Stealing Spyware Redpill Back, Targeting India
  216. Anatomy of an exploit - Linksys router remote password change hole
  217. Bing serves up more malicious sites than Google, report says
  218. Latest from AV Comparatives
  219. Adobe patches Flash, Shockwave and ColdFusion
  220. Serious Vulnerabilities Found in Popular Home Wireless Routers
  221. Are You a Zombie? How to Check for Open DNS Resolvers
  222. Microsoft security bulletin for April 9 2013
  223. Someone, somewhere is injecting banner ads into webpages on the sly.
  224. Sneaky malware hides behind mouse movement, experts say
  225. Skype Malware Stealing Victims' Processing Power to Mine Bitcoins
  226. AMI Firmware Source Code, Private Key Leaked
  227. Shylock Trojan Going Global with New Features,Resilient Infrastructure
  228. Ransomware scares victims with child sex abuse images
  229. Ransomware boosts credibility by reading victims' browsers
  230. Honeypot Stings Attackers With Counterattacks
  231. Researchers find new point-of-sale malware called BlackPOS
  232. Did the spam cyber fight really slow down the Internet?
  233. Internet 'bystanders' affected as massive cyberattack hits Spamhaus
  234. Outdated Java weak spots are widespread, Websense says
  235. Boring Malware Sneaks By Antivirus Sandboxing
  236. Practicing safe DNS with Google
  237. Rootkit coders beware: Malwarebytes is in hot pursuit
  238. Secunia Vulnerability Review 2013
  239. Has HTTPS finally been cracked?
  240. New Trojan Malware Encrypts All Files, Demands Ransom
  241. Ramnit Malware Back and Better at Avoiding Detection
  242. New ZeuS-based modular rootkit offered to cybercriminals
  243. Reckless IT pros are missing security holes in non-Microsoft software
  244. Settlement Finally Reached
  245. Mac malware that infected Facebook bypassed OS X Gatekeeper protection
  246. Microsoft's latest patches squash potential USB hijack
  247. Microsoft security bulletin for March 12 2013
  248. Is two-factor the savior for secure log-ins?
  249. How I ditched the security risks and lived without Java, Reader, and F
  250. Android malware problem should not be ignored, researchers say