View Full Version : Security News

Pages : 1 2 [3] 4 5 6 7 8 9 10

  1. In Heartbleed's wake, Comodo cranks out fresh SSL certificates
  2. Heartbleeding Out: Internet Security Bug Even Worse Than First Believe
  3. Google Chrome Bug Could Allow Websites To Snoop On Conversations
  4. Google adding continuous rogue Android app scans
  5. Breaches expose 552 million identities in 2013
  6. Pro tip: Use Malwarebytes to check app privacy
  7. Heartbleed Bug: What Can You Do?
  8. 'Heartbleed' computer bug threat spreads to firewalls and beyond
  9. Heartbleed bug: Check which sites have been patched
  10. Anatomy of OpenSSL's Heartbleed: Just four bytes trigger horror bug
  11. Google Chrome now remembers the passwords your bank doesn’t want it to
  12. How a website flaw turned 22,000 visitors into a botnet of DDoS zombie
  13. UPATRE Ups the Ante With Attachment Inside An Attachment
  14. Office, IE, Flash fixes accompany Windows XP's final Patch Tuesday
  15. Adobe issues Flash security update
  16. Heartbleed bug: how to avoid this massive web hack
  17. What Is Heartbleed? The Video
  18. Heartbleed - users might want to reset passwords
  19. 6 ways the Internet of Things will transform enterprise security
  20. Scamming still works better than mobile malware: Symantec
  21. Massive Security Bug In OpenSSL Could Affect A Huge Chunk Of The Inter
  22. The April 8th 2014 Security Updates
  23. 18 million email addresses and passwords stolen in Germany
  24. XPocalypse Now: Security experts size up the cyberthreats
  25. CryptoDefense: The story of insecure ransomware keys and...
  26. OldBoot Bootkits – Advanced Android Malware
  27. Adware: A new approach
  28. How much is a security bug report worth to Facebook? About $2,100
  29. Microsoft reveals final Windows XP and Office 2003 security patches
  30. Users face serious threat as hackers take aim at routers, embedded dev
  31. Windows 8.1 Update 1 is a Mandatory Update for Future Security Updates
  32. Researchers Divulge 30 Oracle Java Cloud Service Bugs
  33. LinkedIn email addresses exposed by plug-in software
  34. See global cyberthreats mapped in real time
  35. DVR Infected with Bitcoin Mining Malware
  36. Advance Notification Service for April 2014 Security Bulletin Release
  37. Popular adult site beeg[dot]com pushes malware
  38. Hack of Boxee.tv exposes password data, messages for 158,000 users
  39. Microsoft will no longer look through your Hotmail to investigate leak
  40. How Fandango and Credit Karma exposed millions of smartphone users...
  41. Who Built the ID Theft Service SSNDOB.ru?
  42. Hackonomics: 'Cyber Black Market' more profitable than illegal drug...
  43. Hackonomics: Stolen Twitter accounts ‘more valuable’ than credit cards
  44. Six clicks: How hackers use employees to break through security walls
  45. Gameover malware targets accounts on employment websites
  46. Security black market as mature as any other free market
  47. Malicious apps can hose Android phones, erase data, researchers warn
  48. ATM operators eye Linux as alternative to Windows XP
  49. A thin lifeline for XP users: New Malwarebytes suite will support...
  50. Vulnerability in Microsoft Word Could Allow Remote Code Execution
  51. Windows 7 anti-malware products compared
  52. Sources: Credit Card Breach at California DMV
  53. Microsoft alters Hotmail policy amid blogger inbox probe outcry
  54. Researchers find cross-platform RAT for Windows, Android
  55. Avast Warns of 'Data Breach Crisis' as XP Support Ends
  56. Gmail Traffic Between Google Servers Now Encrypted To Thwart NSA
  57. ZBOT Adds Clickbot Routine To Arsenal
  58. Most ATMs will remain on Windows XP after Microsoft pulls plug on OS
  59. Tor warns of malicious Tor browser offered on the App Store
  60. Mozilla patches 20 Firefox flaws, plugs Pwn2Own holes
  61. New research forecasts the staggering cost of cybercrime
  62. Online tool for browsing and analyzing web-based malware
  63. Report: Average of 82,000 new malware threats per day in 2013
  64. Another Data Breach Crisis Looms as Microsoft’s D-Day for XP Forces...
  65. Google Docs Users Targeted by Sophisticated Phishing Scam
  66. OPERATION WINDIGO: Malware Used To Attack Over 500,000 Computers Daily
  67. Chrome OS security holes found, patched
  68. March 2014 Security Bulletin Webcast and Q&A
  69. Three Things to Take Away from CanSecWest, Pwn2Own
  70. Adobe patches a critical vulnerability in Shockwave Player
  71. Target Knew About Credit Card Hack For 12 Days Before Reacting
  72. Want secure software? Listen to Marge Simpson
  73. Should Microsoft allow almost half a billion PCs to become potential..
  74. 200M consumer records exposed in Experian security lapse
  75. Attackers trick 162,000 WordPress sites into launching DDoS attack
  76. US-CERT urges XP users to dump IE
  77. Uroburos Malware Defeats Microsoft’s PatchGuard
  78. Got a Netgear router from Virgin Media? Change your admin password NOW
  79. Security updates available for Adobe Flash Player
  80. Microsoft Patch Tuesday - 5 bulletins, 2 critical, 1 for Mac users!
  81. Watch Out! Invisible Profiles Can Hack Your iPhone
  82. Google Play: Whats the newest threat on the official Android market?
  83. Chameleon WiFi Virus Spreads Like a Cold
  84. New Attacks on HTTPS Traffic Reveal Plenty About Your Web Surfing
  85. Malware designed to take over cameras and record audio enters Google..
  86. Twitter fixes 'rare' bug that made protected accounts readable
  87. New crimeware tool Dendroid makes it easier to create Android malware
  88. Web ads eclipse porn as leading source of mobile malware
  89. Pre-installed malware found on new Android phones
  90. Report: Half of all exploits target Java
  91. Microsoft Security Bulletin Advance Notification for March 11th 2014
  92. Attack campaign compromises 300,000 home routers, alters DNS settings
  93. Our brains work hard to spot phishing scams, but still often fail
  94. Critical crypto bug leaves Linux, hundreds of apps open to eavesdrop..
  95. Google Fixes Nearly 20 Bugs in Chrome 33
  96. Scareware pusher loses appeal against epic $163 million fine
  97. 40 percent of Cryptolocker victims pay the ransom
  98. RSAC: Is Someone Watching Every Time You Touch Your Smartphone?
  99. How to turn a phone into a covert bugging device? Infect the printer
  100. Notorious "Gameover" malware gets itself a kernel-mode rootkit...
  101. How to keep your PC secure when Microsoft ends Windows XP support
  102. Netflix Scam
  103. Do Sentences Make Better Passwords?
  104. Security 2014: The holes are in the apps, not the operating systems
  105. Fake PayPal “Survey Program” Email Wants Card Details
  106. Android Botnets Hop on the TOR Train
  107. A close look at a targeted attack delivery
  108. How to rescue your PC from ransomware
  109. Study: IRS exposing Social Security numbers online
  110. Banking Trojans emerge as dominant mobile malware threat
  111. RSAC: Can Windows Updates Protect Against Malware?
  112. Announcing Enhanced Mitigation Experience Toolkit (EMET) 5.0 Preview
  113. Attack code bypasses Microsoft zero-day protection software
  114. Crypto weaknesses in WhatsApp “the kind of stuff the NSA would love”
  115. 'Major flaw' in Apple software leaves mobile devices vulerable to hack
  116. First-rate phishing email claims "Your Paypal transaction was declined
  117. Cyberattacks fallout could cost the global economy $3 trillion by 2020
  118. The simple way to stop serious Microsoft software flaws?
  119. Malware-infected Android apps spike in the Google Play store
  120. Iranians hacked Navy network for four months? Not a surprise.
  121. Belkin Fixes WeMo Vulnerabilities With Firmware Update
  122. Again - Adobe patches zero-day Flash flaw
  123. Twitter starts rolling out HTTPS by default - good news for security a
  124. Microsoft Security Advisory (2934088) IE9,10
  125. Hiding in plain sight: a story about a sneaky banking Trojan
  126. Dear Asus router user: You’ve been pwned, thanks to easily exploited..
  127. Attackers scanning for Symantec Endpoint Protection Manager flaw
  128. Kaspersky Lab Confirms Hidden Threat in BIOSes of Popular Laptops...
  129. Update: Third of Internet Explorer users at risk from attacks
  130. The sad state of cyber security readiness
  131. Bogus Microsoft "Reactivate Your Email Account" emails doing rounds
  132. Microsoft enters into new global partnerships in fight against...
  133. New Internet Explorer 10 zero-day exploit targets U.S. military
  134. 10 tips for spotting a phishing email
  135. Adobe Patches Critical Vulnerabilities in Shockwave
  136. Have a Linksys router? Now's a good time to update that firmware
  137. Record 12.8 billion cyberattacks seen in Japan last year
  138. "The Mask" Espionage Malware
  139. Record-Breaking DDoS Attack Nears 400 Gbps
  140. 2013 Microsoft Computing Safety Index
  141. New Ransomware Blocks Your DNS Connection, Mines Bitcoins
  142. New Flash exploit used to distribute credential-stealing malware
  143. How to Call Ransomware's Bluff
  144. Microsoft Security Bulletin Advance Notification for February 11 2014
  145. iFrame attack injects code via PNGs
  146. Adobe issues emergency Flash update for Windows and Mac
  147. Chrome to warn of possible settings hijack
  148. The Risk inside your credit card
  149. More card-stealing malware found
  150. Yahoo Detects Mass Hack Attempt On Yahoo Mail, Resets All Affected PWs
  151. Fully functional trojanized FileZilla client steals FTP logins
  152. VPN bypass vulnerability affects Android Jelly Bean and KitKat
  153. Cross-Platform Java bot found
  154. Malware infects Android-run devices via PCs
  155. Chrome Bugs Allow Sites to Listen to Your Private Conversations
  156. Scientists detect “spoiled onions” trying to sabotage Tor
  157. Hackers access 16 million email accounts in Germany
  158. Israeli Android researchers demo VPN vulnerability
  159. Changes in Windows Authenticode Signature Verification [Dec 13, 2013]
  160. Cyber attack that sent 750k malicious emails traced to hacked fridge
  161. Israeli security startup brings 'thinking' firewall to enterprise
  162. Nearly HALF of South Korea hacked in insider data theft
  163. Adware vendors buy Chrome Extensions to send ad- and malware-filled
  164. Six more U.S. retailers hit by Target-like hacks
  165. Neverquest Trojan: Built to Steal from Hundreds of Banks
  166. Microsoft closes Office 365 admin access vulnerability
  167. bleepingcomputer CryptoLocker Ransomware Information Guide and FAQ
  168. After hack, Target offers year of free credit monitoring
  169. A First Look at the Target Intrusion, Malware
  170. Explosive growth of advanced attacks and malicious traffic
  171. Target's data breach: No, really. It gets even worse.
  172. Amazon and GoDaddy are the biggest malware hosters
  173. TrueCrypt Master Key Extraction And Volume Identification
  174. AV vendors will deliver Windows XP anti-malware signatures for years
  175. Microsoft antimalware support for Windows XP
  176. Improperly Issued Digital Certificates Could Allow Spoofing
  177. Microsoft Kills MSE for XP
  178. Default settings leave external hard drives connected to Asus routers
  179. Yahoo malware turned European computers into bitcoin slaves
  180. Target data breach exposes serious threat of POS malware and botnets
  181. Oracle to patch Java, other products Tuesday
  182. Microsoft Security Bulletin Advance Notification for January 14th 2014
  183. $100 malware kit lets anyone build their own CryptoLocker
  184. Intel kills off McAfee Security brand
  185. Hackers easily hijack Windows crash reports, report says
  186. Trojan targeting World of Warcraft accounts
  187. Bad Ads on Yahoo Infected Thousands of Users With Malware
  188. Backdoor in wireless DSL routers lets attacker reset router, get admin
  189. CryptoLocker creeps lure victims with fake Adobe, Microsoft activation
  190. Snapchat hack affects 4.6 million users
  191. SD cards hacked
  192. Neverquest banking malware more dangerous than Zeus trojan
  193. Malware Protection metrics – November results
  194. Alert: Adobe License Key Email Scam
  195. Cryptolocker malware masterminds make around $30 million in 100 days
  196. Tech threats abound beyond spam, malware during holidays
  197. Target: 40M card accounts may be breached
  198. What's the greatest security risk?
  199. Remote webcam activation without warning light confirmed: Johns Hopkin
  200. Effective new Trojan skims card info from widely used ATMs
  201. Cracking RSA 4096-bit encryption with a microphone
  202. Malwarebytes 2013 Threat Report
  203. Fake VPN Site Serves Up Keylogger
  204. Bogus AV program uses 12 stolen digital certificates...
  205. Latest AV Comparatives results
  206. Hacking The Zero-Day Vulnerability Market
  207. Security Professionals: Top Cyber Threat Predictions for 2014
  208. Firms Eliminate Embedded Code To Foil Targeted Attacks
  209. Gmail Image Proxy Change Has Privacy, Security Implications
  210. Cryptolocker: Menace of 2013
  211. 64-Bit Version of Zeus Banking Trojan In The Wild
  212. The five most dangerous email subjects to watch for
  213. Dozens of zero-day flaws exist for exploit daily, report says
  214. PDF, Flash, and Java: the Most Dangerous File Types
  215. Improperly Issued Digital Certificates Could Allow Spoofing
  216. Microsoft, the FBI, Europol disrupt the notorious ZeroAccess botnet
  217. Researchers discover database with 2M stolen login credentials
  218. The biggest malware, security threats in 2013
  219. Credit card fraud comes of age with advances in point-of-sale botnets
  220. Scientist-developed malware covertly jumps air gaps...
  221. At it again with the phishing messages from MS
  222. Forensics Method Quickly Identifies CryptoLocker Encrypted Files
  223. Bitcoin’s skyrocketing value ushers in era of $1 million hacker heists
  224. 'Neverquest' trojan threatens online banking users
  225. Microsoft: Our protection metrics – October results
  226. Symantec: 'Blackshades' malware still being sold
  227. CryptoLocker gang teams with botnet-builders on ransomware
  228. Cryptolocker lowers ransom demands as Bitcoin price surges
  229. Android, Bitcoin top malware targets, McAfee reports
  230. Cops pay Crylock ransom...
  231. LG smart TV snooping extends to home networks, second blogger says
  232. Microsoft Bringing Message Encryption To Office 365 In Early 2014
  233. New backdoor worm found attacking websites running Apache Tomcat
  234. Warning! Targeted Internet misdirection on the rise
  235. Google strengthens its SSL configuration against possible attacks
  236. Netflix users in danger of unknowingly picking up malware
  237. Backup the best defense against (Cri)locked files
  238. Mobile malware reported riding on Google messaging service
  239. Exclusive: FBI warns of U.S. government breaches by Anonymous hackers
  240. “We still don’t encrypt server-to-server data,” admits Microsoft
  241. UK Police warn SERIOUS RANSOMWARE attack against UK users
  242. Cybercriminals target Silverlight browser plug-in users
  243. Researchers hack Internet Explorer 11 and Chrome at Mobile Pwn2Own
  244. Microsoft: IE Patch Tuesday vulnerabilities not actually patched
  245. Microsoft pushes crypto standards forward
  246. Microsoft unveils Cybercrime Center to tackle malware, botnets, etc...
  247. The Enhanced Mitigation Experience Toolkit v4.1
  248. MSRT November 2013 - Napolar
  249. Even the space station has been infected by malware, claims Kaspersky
  250. New IE zero-day attack reported