View Full Version : Security News

Pages : 1 2 3 [4] 5 6 7 8 9 10

  1. Trend Micro Acquires Broadweb
  2. Adobe's first update since the Big Breach - RoboHelp, Acrobat and Read
  3. Microsoft awards $100,000 to researcher for attack technique
  4. Phone charger can place user on malware alert
  5. New proof-of-concept tool detects stealthy malware hiding in graphics
  6. Massive Compromise of Adobe Source Code
  7. Three new attacks using IE zero-day exploit
  8. Microsoft Security Bulletin Advance Notification for October 8th 2013
  9. Hidden click fraud botnet uncovered
  10. Malicious browser extensions pose a serious threat and defenses are...
  11. F-Secure just released its Threat Report for first half of 2013
  12. Shylock Financial Malware Back and Targeting Two Dozen Major Banks
  13. Security researchers create undetectable hardware trojans
  14. Revoyem Ransomware Sinks to New Low
  15. Surreptitiously Tampering with Computer Chips
  16. Vulnerability in Internet Explorer Could Allow Remote Code Execution
  17. Oracle finally adds whitelisting capabilities to Java
  18. Security of Java takes a dangerous turn for the worse, experts say
  19. Firefox OS likely to face HTML5, Boot-to-Gecko attacks
  20. Shame on you! Report: Users lazier than ever about security practices
  21. Microsoft security bulletin for September 10 2013
  22. New advanced banking Trojan in the wild
  23. First case of Android Trojan spreading via mobile botnets discovered
  24. MS Security Bulletin Advance Notification for September 5th 2013
  25. NetTraveler Variant Adds Java Exploits, Watering Hole Attacks...
  26. Unpatched Mac bug gives attackers “super user” status
  27. Java 6 users vulnerable to zero day flaw, security experts warn
  28. Malicious Chrome extensions on the rise
  29. ESET reports trojan in Orbit Downloader
  30. Why does Malwarebytes keep flagging my favorite sites as malware?
  31. Microsoft predicts bleak future for XP users after patches run out
  32. Android becomes Windows' equal as a target for hackers
  33. Apple Store's malware problem exposed by researchers
  34. Security Researcher Hacks Mark Zuckerberg’s Wall To Prove His Exploit
  35. LastPass password manager gets security patch against password leakage
  36. The professionalization of malware
  37. Web servers are hackers’ target of choice
  38. XP's retirement will be hacker heaven
  39. Microsoft security bulletin for August 13 2013
  40. “Hand of Thief” banking trojan doesn’t do Windows—but it does Linux
  41. Chrome password security issue stirs debate
  42. New strain of ransomware evades detection by AV apps
  43. Windows Phones open to hackers when connecting to rogue Wi-Fi
  44. Wi-Fi routers: More security risks than ever
  45. Researchers demo exploits that bypass Windows 8 Secure Boot
  46. Boffins: We have FOOLED APPLE with malware app
  47. Canonical bares breach details as Apple continues security silence
  48. Chrome, Firefox users targeted with account-hijacking plugins
  49. Facebook pushes all users onto more secure connection by default
  50. XKeyscore NSA tool uncovered, collects pretty much the whole internet
  51. USB flash drives masquerading as keyboards
  52. Feds tell Web firms to turn over user account passwords
  53. Smishing: A Serious Identity Theft Scheme
  54. Android malware samples jump six-fold in Q2
  55. Equal-opportunity malware targets Macs and Windows
  56. Apple Developer portal breach credited to security researcher
  57. SIM card has finally been hacked: Billions of phones at risk
  58. Cyberattacks account for up to $1 trillion in global losses
  59. Unusual file-infecting malware steals FTP credentials
  60. New vulnerability in Java 7 opens door to 10-year-old attack
  61. Android's very real 'Master Key' vulnerability
  62. How to tackle JavaScript-based ransomware sites
  63. IT security spend up, but in the wrong places, Oracle says
  64. How Microsoft handed the NSA access to encrypted messages
  65. Here's what an eavesdropper sees when you use an unsecured Wi-Fi hotsp
  66. New disk wiper malware linked to attacks in South Korea
  67. Uncovering Android Master Key That Makes 99% of Devices Vulnerable
  68. Vobfus and Beebone: Two computer viruses team up to infect computers
  69. Ubisoft warns millions of video gamers of hack attack
  70. Malwarebytes Revisits Geolocation Metadata In Our Toys
  71. Anatomy of a browser trick - you've heard of "clickjacking", now meet
  72. Six Percent of Free Android Apps Hide Intrusive Adware
  73. Most Internet users have fallen victim to malware
  74. Opera developers explain why malicious "update" wasn't detected
  75. Hard drive-wiping malware part of new wave of threats targeting SKorea
  76. Leak of powerful malware tool like “handing a bazooka to a child”
  77. One-click/key attack forces IE and Chrome to execute malicious code
  78. Facebook leaks are a lot leakier than Facebook is letting on
  79. Fake BlackBerry Messaging App Tricks 100,000 Android Users
  80. Opera breached, has code cert stolen, possibly spreads malware - advic
  81. Mobile malware grows by 614 percent in last year
  82. Vast majority of malware attacks spawned from legit sites
  83. Google adds malware site flags to Transparency Report
  84. Stanford, Mozilla, Opera team up to tackle cookie privacy issues
  85. Malwarebytes unveils ExplotShield-based Anti-Exploit Beta
  86. Facebook bug exposed contact info of 6M users
  87. Microsoft Citadel botnet assault liberated 2 million PCs
  88. Microsoft unleashes bug bounty program — for betas, too
  89. Oracle to fix 40 holes in Java on Tuesday, 18 June 2013
  90. EMET 4.0 now available for download
  91. Latest from AV comparatives
  92. Malware masquerading as Bad Piggies found on Google Play
  93. Microsoft misses Google-found flaw in Patch Tuesday updates
  94. Microsoft security bulletin for June 11 2013
  95. Android trojan attempts to spread via Bluetooth
  96. Microsoft Security Bulletin Advance Notification for June 2013
  97. New leak shows feds can access user accounts for Google, Facebook...
  98. Malware increasingly uses peer-to-peer communications, researchers say
  99. Microsoft helps disrupt massive financial cybercrime ring
  100. Google beefs up the cash bounty for reporting vulnerabilities
  101. Apple's OS X and Safari get biggish security fixes
  102. Charger can hack Apple devices with ‘alarming ease’, researchers claim
  103. For the love of God, please secure your wireless networks
  104. Oracle reveals plans for Java security improvements
  105. Judge: FBI Doesn't Need a Warrant to Access Google Customer Data
  106. Carna Botnet Analysis Renders Scary Numbers on Vulnerable Devices
  107. Malware-splosion: 2013 Will be Malware's Biggest Year Ever
  108. Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv13
  109. Think you have a strong password?
  110. Google researcher reveals another Windows 0-day
  111. Zeus variants are back with a vengeance
  112. Scanner identifies malware strains, could be future of AV
  113. Linux/Cdorked Malware Attacking Some of the World’s Top Web Servers
  114. Google upgrading all SSL certificates to 2048-bit keys by end of 2013
  115. Only 36% of small firms apply security patches
  116. Apple patches security holes in QuickTime on Windows
  117. Power utilities claim 'daily' and 'constant' cyberattacks, says report
  118. Researchers find critical vulnerabilities in popular game engines
  119. US urged to permit self-defense retaliation on hackers
  120. Chinese hackers resume attacks on U.S. targets
  121. Cyber espionage campaign uses professionally-made malware
  122. Form-grabbing rootkit sold on underground forums
  123. Microsoft: Invulnerable software is not possible
  124. Info-stealing Dorkbot worm spreading on Facebook
  125. New Mac spyware signed with legitimate Apple Developer ID
  126. Windows Malware Techniques Spread to Android
  127. Internet Explorer best at blocking malware
  128. Speed Up PC Performance by Replacing Microsoft's Built-In Antivirus
  129. Adobe unleases critical patches for ColdFusion, Reader and Flash
  130. U.S. government tops list of malware buyers
  131. Microsoft security bulletin for may 14 2013
  132. Microsoft warns of new Trojan hijacking Facebook accounts
  133. Hackers breached Washington state court with Adobe ColdFusion flaw
  134. Google unveils 5-year roadmap for strong authentication
  135. Microsoft releases emergency patch for critical IE8 zero-day exploit
  136. How hackable is your password? McAfee offers password tips
  137. Possible Zero-Day Attack Today.
  138. PSA: Call of Duty: Ghosts “beta invite” imposter websites on the prowl
  139. Cyberattack affected US defense contractor over three-year period
  140. IE8 zero-day flaw targets U.S. nuke researchers
  141. ICS-CERT Revises Recommendations to Avoid Shamoon Infections
  142. Multi-stage exploit attacks for more effective malware delivery
  143. Which companies help protect your data from the government?
  144. Vulnerability in Internet Explorer Could Allow Remote Code Execution
  145. An important update regarding Norton Ghost™
  146. Adobe confirms 'leaky PDF' flaw, fix due on 14 May
  147. Feds want to expand wiretap law from ISPs to Google, Facebook
  148. Mozilla: Protecting our brand from a global spyware provider
  149. Kaspersky founder warns nations face growing cyberattack threats
  150. Does Java 8 Delay Mean Oracle Finally Serious about Security?
  151. Hacking suspect arrested for 'biggest cyberattack in history'
  152. S. Korea tops Asia's malware infection list
  153. Alert: Skype account hijack technique may affect all users
  154. Exploding the urban myths about how to stay safe online
  155. Recently patched Java flaw already targeted in mass attacks
  156. 'Ransomware' tricks victims into paying hefty fines
  157. Malware C&C Servers Found in 184 Countries
  158. Java Sandbox Bypass Discovered that Breaks Latest Update
  159. Introducing the Secunia Country Reports
  160. Latest Security Intelligence Report Shows 24% of PCs are Unprotected
  161. Beware of fake SourceForge site offering malicious downloads
  162. New version of Gozi financial malware bundles MBR rootkit
  163. “BadNews” malware in Google Play downloaded up to 9 million times
  164. WordPress attack highlights 30 million targets
  165. ‘Magic’ Espionage Malware hits Thousands of UK Computers
  166. Antivirus Fails 1 in 500 PCs
  167. Oracle takes a leaf out of Microsoft’s book, prioritizes Java security
  168. Just how much malware is on free porn sites?
  169. Most corporate computers missing critical software updates
  170. Study: 32.8 Million Android Phones Infected with Malware
  171. Flawed Malwarebytes security update wipes out thousands of computers
  172. First anti-malware product for UEFI
  173. Chrome Download Warnings Target Malicious Binaries
  174. Top Wi-Fi routers easy to hack, says study
  175. Steve Gibson's Fingerprint service detects SSL man in the middle
  176. Oracle to release 128 security patches, hundreds of products affected
  177. Malwarebytes Update causes Massive false positives.
  178. 'Winnti' Malware Targeting Online Gaming Firms
  179. Common security flaws leave applications open to amateur hackers
  180. Shylock Trojan aims for global targets, Symantec warns
  181. McAfee, NIST partner to boost U.S. cyberdefenses
  182. Huge attack on WordPress sites could spawn never-before-seen super bot
  183. Data-Stealing Spyware Redpill Back, Targeting India
  184. Anatomy of an exploit - Linksys router remote password change hole
  185. Bing serves up more malicious sites than Google, report says
  186. Latest from AV Comparatives
  187. Adobe patches Flash, Shockwave and ColdFusion
  188. Serious Vulnerabilities Found in Popular Home Wireless Routers
  189. Are You a Zombie? How to Check for Open DNS Resolvers
  190. Microsoft security bulletin for April 9 2013
  191. Someone, somewhere is injecting banner ads into webpages on the sly.
  192. Sneaky malware hides behind mouse movement, experts say
  193. Skype Malware Stealing Victims' Processing Power to Mine Bitcoins
  194. AMI Firmware Source Code, Private Key Leaked
  195. Shylock Trojan Going Global with New Features,Resilient Infrastructure
  196. Ransomware scares victims with child sex abuse images
  197. Ransomware boosts credibility by reading victims' browsers
  198. Honeypot Stings Attackers With Counterattacks
  199. Researchers find new point-of-sale malware called BlackPOS
  200. Did the spam cyber fight really slow down the Internet?
  201. Internet 'bystanders' affected as massive cyberattack hits Spamhaus
  202. Outdated Java weak spots are widespread, Websense says
  203. Boring Malware Sneaks By Antivirus Sandboxing
  204. Practicing safe DNS with Google
  205. Rootkit coders beware: Malwarebytes is in hot pursuit
  206. Secunia Vulnerability Review 2013
  207. Has HTTPS finally been cracked?
  208. New Trojan Malware Encrypts All Files, Demands Ransom
  209. Ramnit Malware Back and Better at Avoiding Detection
  210. New ZeuS-based modular rootkit offered to cybercriminals
  211. Reckless IT pros are missing security holes in non-Microsoft software
  212. Settlement Finally Reached
  213. Mac malware that infected Facebook bypassed OS X Gatekeeper protection
  214. Microsoft's latest patches squash potential USB hijack
  215. Microsoft security bulletin for March 12 2013
  216. Is two-factor the savior for secure log-ins?
  217. How I ditched the security risks and lived without Java, Reader, and F
  218. Android malware problem should not be ignored, researchers say
  219. Pwn2Own: Down go all the browsers
  220. Researchers win $100,000 for Chrome hack leaving Windows vulnerable
  221. Rogue Apache modules pushing iFrame injections which drive traffic to
  222. Blackhole outfitted with exploit for recently patched Java flaw
  223. Researcher Finds Five New Java Sandbox Vulnerabilities
  224. Oracle rushes out last-minute patch for vulnerabilities
  225. Java malware 'was signed with certificates stolen from security vendor
  226. Another Java zero-day exploit in the wild actively attacking targets
  227. Security Alert for Evernote Users.
  228. Tips to minimize the risk and impact of identity fraud
  229. Oracle investigating after two more Java 7 zero-day flaws found
  230. Avast 8 Released
  231. RSA: Your SmartPhone Stores Every Keystroke You Ever Typed
  232. Google's Vint Cerf talks identifiers vs. pseudonyms online
  233. Adobe issues another patch for Flash vulnerabilities
  234. Yet another Java breech........
  235. Microsoft Warns About Pitfalls of Pirated Software
  236. Firefox 22 will block 3rd party cookies by default
  237. Some Off-Shore Oil Rigs Have Been “Incapacitated” By Malware
  238. Malware getting smarter, says McAfee
  239. Adobe releases emergency patches for Reader and Acrobat
  240. Cyberattack threatens most businesses, Deloitte survey says
  241. Chinese Army linked to hacks of U.S. companies, agencies
  242. Adobe to release Reader, Acrobat zero-day patch this week
  243. The 10 weirdest, wildest, most shocking security exploits ever
  244. Adobe confirms targeted attacks due to security hole in Reader
  245. Adobe Reader Zero Day
  246. Obama's cybersecurity executive order: What you need to know
  247. Happy Hacker no more.
  248. Advance Notification Service for the February 2013 Security Bulletin
  249. New update for Adobe Flash
  250. Intel Ethernet controller vulnerable to 'packet of death'