View Full Version : Security News

Pages : 1 2 3 [4] 5 6 7 8 9 10

  1. 5 Wi-Fi security myths you must abandon now
  2. Our commitment to Microsoft antimalware
  3. pcworld: threats via a compromised webcam
  4. Trend Micro Acquires Broadweb
  5. Adobe's first update since the Big Breach - RoboHelp, Acrobat and Read
  6. Microsoft awards $100,000 to researcher for attack technique
  7. Phone charger can place user on malware alert
  8. New proof-of-concept tool detects stealthy malware hiding in graphics
  9. Massive Compromise of Adobe Source Code
  10. Three new attacks using IE zero-day exploit
  11. Microsoft Security Bulletin Advance Notification for October 8th 2013
  12. Hidden click fraud botnet uncovered
  13. Malicious browser extensions pose a serious threat and defenses are...
  14. F-Secure just released its Threat Report for first half of 2013
  15. Shylock Financial Malware Back and Targeting Two Dozen Major Banks
  16. Security researchers create undetectable hardware trojans
  17. Revoyem Ransomware Sinks to New Low
  18. Surreptitiously Tampering with Computer Chips
  19. Vulnerability in Internet Explorer Could Allow Remote Code Execution
  20. Oracle finally adds whitelisting capabilities to Java
  21. Security of Java takes a dangerous turn for the worse, experts say
  22. Firefox OS likely to face HTML5, Boot-to-Gecko attacks
  23. Shame on you! Report: Users lazier than ever about security practices
  24. Microsoft security bulletin for September 10 2013
  25. New advanced banking Trojan in the wild
  26. First case of Android Trojan spreading via mobile botnets discovered
  27. MS Security Bulletin Advance Notification for September 5th 2013
  28. NetTraveler Variant Adds Java Exploits, Watering Hole Attacks...
  29. Unpatched Mac bug gives attackers “super user” status
  30. Java 6 users vulnerable to zero day flaw, security experts warn
  31. Malicious Chrome extensions on the rise
  32. ESET reports trojan in Orbit Downloader
  33. Why does Malwarebytes keep flagging my favorite sites as malware?
  34. Microsoft predicts bleak future for XP users after patches run out
  35. Android becomes Windows' equal as a target for hackers
  36. Apple Store's malware problem exposed by researchers
  37. Security Researcher Hacks Mark Zuckerberg’s Wall To Prove His Exploit
  38. LastPass password manager gets security patch against password leakage
  39. The professionalization of malware
  40. Web servers are hackers’ target of choice
  41. XP's retirement will be hacker heaven
  42. Microsoft security bulletin for August 13 2013
  43. “Hand of Thief” banking trojan doesn’t do Windows—but it does Linux
  44. Chrome password security issue stirs debate
  45. New strain of ransomware evades detection by AV apps
  46. Windows Phones open to hackers when connecting to rogue Wi-Fi
  47. Wi-Fi routers: More security risks than ever
  48. Researchers demo exploits that bypass Windows 8 Secure Boot
  49. Boffins: We have FOOLED APPLE with malware app
  50. Canonical bares breach details as Apple continues security silence
  51. Chrome, Firefox users targeted with account-hijacking plugins
  52. Facebook pushes all users onto more secure connection by default
  53. XKeyscore NSA tool uncovered, collects pretty much the whole internet
  54. USB flash drives masquerading as keyboards
  55. Feds tell Web firms to turn over user account passwords
  56. Smishing: A Serious Identity Theft Scheme
  57. Android malware samples jump six-fold in Q2
  58. Equal-opportunity malware targets Macs and Windows
  59. Apple Developer portal breach credited to security researcher
  60. SIM card has finally been hacked: Billions of phones at risk
  61. Cyberattacks account for up to $1 trillion in global losses
  62. Unusual file-infecting malware steals FTP credentials
  63. New vulnerability in Java 7 opens door to 10-year-old attack
  64. Android's very real 'Master Key' vulnerability
  65. How to tackle JavaScript-based ransomware sites
  66. IT security spend up, but in the wrong places, Oracle says
  67. How Microsoft handed the NSA access to encrypted messages
  68. Here's what an eavesdropper sees when you use an unsecured Wi-Fi hotsp
  69. New disk wiper malware linked to attacks in South Korea
  70. Uncovering Android Master Key That Makes 99% of Devices Vulnerable
  71. Vobfus and Beebone: Two computer viruses team up to infect computers
  72. Ubisoft warns millions of video gamers of hack attack
  73. Malwarebytes Revisits Geolocation Metadata In Our Toys
  74. Anatomy of a browser trick - you've heard of "clickjacking", now meet
  75. Six Percent of Free Android Apps Hide Intrusive Adware
  76. Most Internet users have fallen victim to malware
  77. Opera developers explain why malicious "update" wasn't detected
  78. Hard drive-wiping malware part of new wave of threats targeting SKorea
  79. Leak of powerful malware tool like “handing a bazooka to a child”
  80. One-click/key attack forces IE and Chrome to execute malicious code
  81. Facebook leaks are a lot leakier than Facebook is letting on
  82. Fake BlackBerry Messaging App Tricks 100,000 Android Users
  83. Opera breached, has code cert stolen, possibly spreads malware - advic
  84. Mobile malware grows by 614 percent in last year
  85. Vast majority of malware attacks spawned from legit sites
  86. Google adds malware site flags to Transparency Report
  87. Stanford, Mozilla, Opera team up to tackle cookie privacy issues
  88. Malwarebytes unveils ExplotShield-based Anti-Exploit Beta
  89. Facebook bug exposed contact info of 6M users
  90. Microsoft Citadel botnet assault liberated 2 million PCs
  91. Microsoft unleashes bug bounty program — for betas, too
  92. Oracle to fix 40 holes in Java on Tuesday, 18 June 2013
  93. EMET 4.0 now available for download
  94. Latest from AV comparatives
  95. Malware masquerading as Bad Piggies found on Google Play
  96. Microsoft misses Google-found flaw in Patch Tuesday updates
  97. Microsoft security bulletin for June 11 2013
  98. Android trojan attempts to spread via Bluetooth
  99. Microsoft Security Bulletin Advance Notification for June 2013
  100. New leak shows feds can access user accounts for Google, Facebook...
  101. Malware increasingly uses peer-to-peer communications, researchers say
  102. Microsoft helps disrupt massive financial cybercrime ring
  103. Google beefs up the cash bounty for reporting vulnerabilities
  104. Apple's OS X and Safari get biggish security fixes
  105. Charger can hack Apple devices with ‘alarming ease’, researchers claim
  106. For the love of God, please secure your wireless networks
  107. Oracle reveals plans for Java security improvements
  108. Judge: FBI Doesn't Need a Warrant to Access Google Customer Data
  109. Carna Botnet Analysis Renders Scary Numbers on Vulnerable Devices
  110. Malware-splosion: 2013 Will be Malware's Biggest Year Ever
  111. Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv13
  112. Think you have a strong password?
  113. Google researcher reveals another Windows 0-day
  114. Zeus variants are back with a vengeance
  115. Scanner identifies malware strains, could be future of AV
  116. Linux/Cdorked Malware Attacking Some of the World’s Top Web Servers
  117. Google upgrading all SSL certificates to 2048-bit keys by end of 2013
  118. Only 36% of small firms apply security patches
  119. Apple patches security holes in QuickTime on Windows
  120. Power utilities claim 'daily' and 'constant' cyberattacks, says report
  121. Researchers find critical vulnerabilities in popular game engines
  122. US urged to permit self-defense retaliation on hackers
  123. Chinese hackers resume attacks on U.S. targets
  124. Cyber espionage campaign uses professionally-made malware
  125. Form-grabbing rootkit sold on underground forums
  126. Microsoft: Invulnerable software is not possible
  127. Info-stealing Dorkbot worm spreading on Facebook
  128. New Mac spyware signed with legitimate Apple Developer ID
  129. Windows Malware Techniques Spread to Android
  130. Internet Explorer best at blocking malware
  131. Speed Up PC Performance by Replacing Microsoft's Built-In Antivirus
  132. Adobe unleases critical patches for ColdFusion, Reader and Flash
  133. U.S. government tops list of malware buyers
  134. Microsoft security bulletin for may 14 2013
  135. Microsoft warns of new Trojan hijacking Facebook accounts
  136. Hackers breached Washington state court with Adobe ColdFusion flaw
  137. Google unveils 5-year roadmap for strong authentication
  138. Microsoft releases emergency patch for critical IE8 zero-day exploit
  139. How hackable is your password? McAfee offers password tips
  140. Possible Zero-Day Attack Today.
  141. PSA: Call of Duty: Ghosts “beta invite” imposter websites on the prowl
  142. Cyberattack affected US defense contractor over three-year period
  143. IE8 zero-day flaw targets U.S. nuke researchers
  144. ICS-CERT Revises Recommendations to Avoid Shamoon Infections
  145. Multi-stage exploit attacks for more effective malware delivery
  146. Which companies help protect your data from the government?
  147. Vulnerability in Internet Explorer Could Allow Remote Code Execution
  148. An important update regarding Norton Ghost™
  149. Adobe confirms 'leaky PDF' flaw, fix due on 14 May
  150. Feds want to expand wiretap law from ISPs to Google, Facebook
  151. Mozilla: Protecting our brand from a global spyware provider
  152. Kaspersky founder warns nations face growing cyberattack threats
  153. Does Java 8 Delay Mean Oracle Finally Serious about Security?
  154. Hacking suspect arrested for 'biggest cyberattack in history'
  155. S. Korea tops Asia's malware infection list
  156. Alert: Skype account hijack technique may affect all users
  157. Exploding the urban myths about how to stay safe online
  158. Recently patched Java flaw already targeted in mass attacks
  159. 'Ransomware' tricks victims into paying hefty fines
  160. Malware C&C Servers Found in 184 Countries
  161. Java Sandbox Bypass Discovered that Breaks Latest Update
  162. Introducing the Secunia Country Reports
  163. Latest Security Intelligence Report Shows 24% of PCs are Unprotected
  164. Beware of fake SourceForge site offering malicious downloads
  165. New version of Gozi financial malware bundles MBR rootkit
  166. “BadNews” malware in Google Play downloaded up to 9 million times
  167. WordPress attack highlights 30 million targets
  168. ‘Magic’ Espionage Malware hits Thousands of UK Computers
  169. Antivirus Fails 1 in 500 PCs
  170. Oracle takes a leaf out of Microsoft’s book, prioritizes Java security
  171. Just how much malware is on free porn sites?
  172. Most corporate computers missing critical software updates
  173. Study: 32.8 Million Android Phones Infected with Malware
  174. Flawed Malwarebytes security update wipes out thousands of computers
  175. First anti-malware product for UEFI
  176. Chrome Download Warnings Target Malicious Binaries
  177. Top Wi-Fi routers easy to hack, says study
  178. Steve Gibson's Fingerprint service detects SSL man in the middle
  179. Oracle to release 128 security patches, hundreds of products affected
  180. Malwarebytes Update causes Massive false positives.
  181. 'Winnti' Malware Targeting Online Gaming Firms
  182. Common security flaws leave applications open to amateur hackers
  183. Shylock Trojan aims for global targets, Symantec warns
  184. McAfee, NIST partner to boost U.S. cyberdefenses
  185. Huge attack on WordPress sites could spawn never-before-seen super bot
  186. Data-Stealing Spyware Redpill Back, Targeting India
  187. Anatomy of an exploit - Linksys router remote password change hole
  188. Bing serves up more malicious sites than Google, report says
  189. Latest from AV Comparatives
  190. Adobe patches Flash, Shockwave and ColdFusion
  191. Serious Vulnerabilities Found in Popular Home Wireless Routers
  192. Are You a Zombie? How to Check for Open DNS Resolvers
  193. Microsoft security bulletin for April 9 2013
  194. Someone, somewhere is injecting banner ads into webpages on the sly.
  195. Sneaky malware hides behind mouse movement, experts say
  196. Skype Malware Stealing Victims' Processing Power to Mine Bitcoins
  197. AMI Firmware Source Code, Private Key Leaked
  198. Shylock Trojan Going Global with New Features,Resilient Infrastructure
  199. Ransomware scares victims with child sex abuse images
  200. Ransomware boosts credibility by reading victims' browsers
  201. Honeypot Stings Attackers With Counterattacks
  202. Researchers find new point-of-sale malware called BlackPOS
  203. Did the spam cyber fight really slow down the Internet?
  204. Internet 'bystanders' affected as massive cyberattack hits Spamhaus
  205. Outdated Java weak spots are widespread, Websense says
  206. Boring Malware Sneaks By Antivirus Sandboxing
  207. Practicing safe DNS with Google
  208. Rootkit coders beware: Malwarebytes is in hot pursuit
  209. Secunia Vulnerability Review 2013
  210. Has HTTPS finally been cracked?
  211. New Trojan Malware Encrypts All Files, Demands Ransom
  212. Ramnit Malware Back and Better at Avoiding Detection
  213. New ZeuS-based modular rootkit offered to cybercriminals
  214. Reckless IT pros are missing security holes in non-Microsoft software
  215. Settlement Finally Reached
  216. Mac malware that infected Facebook bypassed OS X Gatekeeper protection
  217. Microsoft's latest patches squash potential USB hijack
  218. Microsoft security bulletin for March 12 2013
  219. Is two-factor the savior for secure log-ins?
  220. How I ditched the security risks and lived without Java, Reader, and F
  221. Android malware problem should not be ignored, researchers say
  222. Pwn2Own: Down go all the browsers
  223. Researchers win $100,000 for Chrome hack leaving Windows vulnerable
  224. Rogue Apache modules pushing iFrame injections which drive traffic to
  225. Blackhole outfitted with exploit for recently patched Java flaw
  226. Researcher Finds Five New Java Sandbox Vulnerabilities
  227. Oracle rushes out last-minute patch for vulnerabilities
  228. Java malware 'was signed with certificates stolen from security vendor
  229. Another Java zero-day exploit in the wild actively attacking targets
  230. Security Alert for Evernote Users.
  231. Tips to minimize the risk and impact of identity fraud
  232. Oracle investigating after two more Java 7 zero-day flaws found
  233. Avast 8 Released
  234. RSA: Your SmartPhone Stores Every Keystroke You Ever Typed
  235. Google's Vint Cerf talks identifiers vs. pseudonyms online
  236. Adobe issues another patch for Flash vulnerabilities
  237. Yet another Java breech........
  238. Microsoft Warns About Pitfalls of Pirated Software
  239. Firefox 22 will block 3rd party cookies by default
  240. Some Off-Shore Oil Rigs Have Been “Incapacitated” By Malware
  241. Malware getting smarter, says McAfee
  242. Adobe releases emergency patches for Reader and Acrobat
  243. Cyberattack threatens most businesses, Deloitte survey says
  244. Chinese Army linked to hacks of U.S. companies, agencies
  245. Adobe to release Reader, Acrobat zero-day patch this week
  246. The 10 weirdest, wildest, most shocking security exploits ever
  247. Adobe confirms targeted attacks due to security hole in Reader
  248. Adobe Reader Zero Day
  249. Obama's cybersecurity executive order: What you need to know
  250. Happy Hacker no more.