View Full Version : Security News

Pages : [1] 2 3 4 5 6 7 8

  1. The Woops of WPS (Wi-Fi Protected Setup) raises its ugly head again
  2. LaCie admits to year-long credit card breach
  3. Critical Java Update Plugs 37 Security Holes
  4. Akamai Heartbleed patch not a fix after all
  5. U.S. charges nine with distributing Zeus malware
  6. In Heartbleed's wake, Comodo cranks out fresh SSL certificates
  7. Heartbleeding Out: Internet Security Bug Even Worse Than First Believe
  8. Heartbleed Bug Health Report
  9. Google Chrome Bug Could Allow Websites To Snoop On Conversations
  10. Google adding continuous rogue Android app scans
  11. Breaches expose 552 million identities in 2013
  12. Pro tip: Use Malwarebytes to check app privacy
  13. Heartbleed Bug: What Can You Do?
  14. 'Heartbleed' computer bug threat spreads to firewalls and beyond
  15. Heartbleed bug: Check which sites have been patched
  16. Anatomy of OpenSSL's Heartbleed: Just four bytes trigger horror bug
  17. Google Chrome now remembers the passwords your bank doesn’t want it to
  18. How a website flaw turned 22,000 visitors into a botnet of DDoS zombie
  19. UPATRE Ups the Ante With Attachment Inside An Attachment
  20. Office, IE, Flash fixes accompany Windows XP's final Patch Tuesday
  21. Adobe issues Flash security update
  22. Heartbleed bug: how to avoid this massive web hack
  23. What Is Heartbleed? The Video
  24. Heartbleed - users might want to reset passwords
  25. 6 ways the Internet of Things will transform enterprise security
  26. Scamming still works better than mobile malware: Symantec
  27. Massive Security Bug In OpenSSL Could Affect A Huge Chunk Of The Inter
  28. The April 8th 2014 Security Updates
  29. 18 million email addresses and passwords stolen in Germany
  30. XPocalypse Now: Security experts size up the cyberthreats
  31. CryptoDefense: The story of insecure ransomware keys and...
  32. OldBoot Bootkits – Advanced Android Malware
  33. Adware: A new approach
  34. How much is a security bug report worth to Facebook? About $2,100
  35. Microsoft reveals final Windows XP and Office 2003 security patches
  36. Users face serious threat as hackers take aim at routers, embedded dev
  37. Windows 8.1 Update 1 is a Mandatory Update for Future Security Updates
  38. Researchers Divulge 30 Oracle Java Cloud Service Bugs
  39. LinkedIn email addresses exposed by plug-in software
  40. See global cyberthreats mapped in real time
  41. DVR Infected with Bitcoin Mining Malware
  42. Advance Notification Service for April 2014 Security Bulletin Release
  43. Popular adult site beeg[dot]com pushes malware
  44. Hack of Boxee.tv exposes password data, messages for 158,000 users
  45. Microsoft will no longer look through your Hotmail to investigate leak
  46. How Fandango and Credit Karma exposed millions of smartphone users...
  47. Who Built the ID Theft Service SSNDOB.ru?
  48. Hackonomics: 'Cyber Black Market' more profitable than illegal drug...
  49. Hackonomics: Stolen Twitter accounts ‘more valuable’ than credit cards
  50. Six clicks: How hackers use employees to break through security walls
  51. Gameover malware targets accounts on employment websites
  52. Security black market as mature as any other free market
  53. Malicious apps can hose Android phones, erase data, researchers warn
  54. ATM operators eye Linux as alternative to Windows XP
  55. A thin lifeline for XP users: New Malwarebytes suite will support...
  56. Vulnerability in Microsoft Word Could Allow Remote Code Execution
  57. Windows 7 anti-malware products compared
  58. Sources: Credit Card Breach at California DMV
  59. Microsoft alters Hotmail policy amid blogger inbox probe outcry
  60. Researchers find cross-platform RAT for Windows, Android
  61. Avast Warns of 'Data Breach Crisis' as XP Support Ends
  62. Gmail Traffic Between Google Servers Now Encrypted To Thwart NSA
  63. ZBOT Adds Clickbot Routine To Arsenal
  64. Most ATMs will remain on Windows XP after Microsoft pulls plug on OS
  65. Tor warns of malicious Tor browser offered on the App Store
  66. Mozilla patches 20 Firefox flaws, plugs Pwn2Own holes
  67. New research forecasts the staggering cost of cybercrime
  68. Online tool for browsing and analyzing web-based malware
  69. Report: Average of 82,000 new malware threats per day in 2013
  70. Another Data Breach Crisis Looms as Microsoft’s D-Day for XP Forces...
  71. Google Docs Users Targeted by Sophisticated Phishing Scam
  72. OPERATION WINDIGO: Malware Used To Attack Over 500,000 Computers Daily
  73. Chrome OS security holes found, patched
  74. March 2014 Security Bulletin Webcast and Q&A
  75. Three Things to Take Away from CanSecWest, Pwn2Own
  76. Adobe patches a critical vulnerability in Shockwave Player
  77. Target Knew About Credit Card Hack For 12 Days Before Reacting
  78. Want secure software? Listen to Marge Simpson
  79. Should Microsoft allow almost half a billion PCs to become potential..
  80. 200M consumer records exposed in Experian security lapse
  81. Attackers trick 162,000 WordPress sites into launching DDoS attack
  82. US-CERT urges XP users to dump IE
  83. Uroburos Malware Defeats Microsoft’s PatchGuard
  84. Got a Netgear router from Virgin Media? Change your admin password NOW
  85. Security updates available for Adobe Flash Player
  86. Microsoft Patch Tuesday - 5 bulletins, 2 critical, 1 for Mac users!
  87. Watch Out! Invisible Profiles Can Hack Your iPhone
  88. Google Play: Whats the newest threat on the official Android market?
  89. Chameleon WiFi Virus Spreads Like a Cold
  90. New Attacks on HTTPS Traffic Reveal Plenty About Your Web Surfing
  91. Malware designed to take over cameras and record audio enters Google..
  92. Twitter fixes 'rare' bug that made protected accounts readable
  93. New crimeware tool Dendroid makes it easier to create Android malware
  94. Web ads eclipse porn as leading source of mobile malware
  95. Pre-installed malware found on new Android phones
  96. Report: Half of all exploits target Java
  97. Microsoft Security Bulletin Advance Notification for March 11th 2014
  98. Attack campaign compromises 300,000 home routers, alters DNS settings
  99. Our brains work hard to spot phishing scams, but still often fail
  100. Critical crypto bug leaves Linux, hundreds of apps open to eavesdrop..
  101. Google Fixes Nearly 20 Bugs in Chrome 33
  102. Scareware pusher loses appeal against epic $163 million fine
  103. 40 percent of Cryptolocker victims pay the ransom
  104. RSAC: Is Someone Watching Every Time You Touch Your Smartphone?
  105. How to turn a phone into a covert bugging device? Infect the printer
  106. Notorious "Gameover" malware gets itself a kernel-mode rootkit...
  107. How to keep your PC secure when Microsoft ends Windows XP support
  108. Netflix Scam
  109. Do Sentences Make Better Passwords?
  110. Security 2014: The holes are in the apps, not the operating systems
  111. Fake PayPal “Survey Program” Email Wants Card Details
  112. Android Botnets Hop on the TOR Train
  113. A close look at a targeted attack delivery
  114. How to rescue your PC from ransomware
  115. Study: IRS exposing Social Security numbers online
  116. Banking Trojans emerge as dominant mobile malware threat
  117. RSAC: Can Windows Updates Protect Against Malware?
  118. Announcing Enhanced Mitigation Experience Toolkit (EMET) 5.0 Preview
  119. Attack code bypasses Microsoft zero-day protection software
  120. Crypto weaknesses in WhatsApp “the kind of stuff the NSA would love”
  121. 'Major flaw' in Apple software leaves mobile devices vulerable to hack
  122. First-rate phishing email claims "Your Paypal transaction was declined
  123. Cyberattacks fallout could cost the global economy $3 trillion by 2020
  124. The simple way to stop serious Microsoft software flaws?
  125. Malware-infected Android apps spike in the Google Play store
  126. Iranians hacked Navy network for four months? Not a surprise.
  127. Belkin Fixes WeMo Vulnerabilities With Firmware Update
  128. Again - Adobe patches zero-day Flash flaw
  129. Twitter starts rolling out HTTPS by default - good news for security a
  130. Microsoft Security Advisory (2934088) IE9,10
  131. Hiding in plain sight: a story about a sneaky banking Trojan
  132. Dear Asus router user: You’ve been pwned, thanks to easily exploited..
  133. Attackers scanning for Symantec Endpoint Protection Manager flaw
  134. Kaspersky Lab Confirms Hidden Threat in BIOSes of Popular Laptops...
  135. Update: Third of Internet Explorer users at risk from attacks
  136. The sad state of cyber security readiness
  137. Bogus Microsoft "Reactivate Your Email Account" emails doing rounds
  138. Microsoft enters into new global partnerships in fight against...
  139. New Internet Explorer 10 zero-day exploit targets U.S. military
  140. 10 tips for spotting a phishing email
  141. Adobe Patches Critical Vulnerabilities in Shockwave
  142. Have a Linksys router? Now's a good time to update that firmware
  143. Record 12.8 billion cyberattacks seen in Japan last year
  144. "The Mask" Espionage Malware
  145. Record-Breaking DDoS Attack Nears 400 Gbps
  146. 2013 Microsoft Computing Safety Index
  147. New Ransomware Blocks Your DNS Connection, Mines Bitcoins
  148. New Flash exploit used to distribute credential-stealing malware
  149. How to Call Ransomware's Bluff
  150. Microsoft Security Bulletin Advance Notification for February 11 2014
  151. iFrame attack injects code via PNGs
  152. Adobe issues emergency Flash update for Windows and Mac
  153. Chrome to warn of possible settings hijack
  154. The Risk inside your credit card
  155. More card-stealing malware found
  156. Yahoo Detects Mass Hack Attempt On Yahoo Mail, Resets All Affected PWs
  157. Fully functional trojanized FileZilla client steals FTP logins
  158. VPN bypass vulnerability affects Android Jelly Bean and KitKat
  159. Cross-Platform Java bot found
  160. Malware infects Android-run devices via PCs
  161. Chrome Bugs Allow Sites to Listen to Your Private Conversations
  162. Scientists detect “spoiled onions” trying to sabotage Tor
  163. Hackers access 16 million email accounts in Germany
  164. Israeli Android researchers demo VPN vulnerability
  165. Changes in Windows Authenticode Signature Verification [Dec 13, 2013]
  166. Cyber attack that sent 750k malicious emails traced to hacked fridge
  167. Israeli security startup brings 'thinking' firewall to enterprise
  168. Nearly HALF of South Korea hacked in insider data theft
  169. Adware vendors buy Chrome Extensions to send ad- and malware-filled
  170. Six more U.S. retailers hit by Target-like hacks
  171. Neverquest Trojan: Built to Steal from Hundreds of Banks
  172. Microsoft closes Office 365 admin access vulnerability
  173. bleepingcomputer CryptoLocker Ransomware Information Guide and FAQ
  174. After hack, Target offers year of free credit monitoring
  175. A First Look at the Target Intrusion, Malware
  176. Explosive growth of advanced attacks and malicious traffic
  177. Target's data breach: No, really. It gets even worse.
  178. Amazon and GoDaddy are the biggest malware hosters
  179. TrueCrypt Master Key Extraction And Volume Identification
  180. AV vendors will deliver Windows XP anti-malware signatures for years
  181. Microsoft antimalware support for Windows XP
  182. Improperly Issued Digital Certificates Could Allow Spoofing
  183. Microsoft Kills MSE for XP
  184. Default settings leave external hard drives connected to Asus routers
  185. Yahoo malware turned European computers into bitcoin slaves
  186. Target data breach exposes serious threat of POS malware and botnets
  187. Oracle to patch Java, other products Tuesday
  188. Microsoft Security Bulletin Advance Notification for January 14th 2014
  189. $100 malware kit lets anyone build their own CryptoLocker
  190. Intel kills off McAfee Security brand
  191. Hackers easily hijack Windows crash reports, report says
  192. Trojan targeting World of Warcraft accounts
  193. Bad Ads on Yahoo Infected Thousands of Users With Malware
  194. Backdoor in wireless DSL routers lets attacker reset router, get admin
  195. CryptoLocker creeps lure victims with fake Adobe, Microsoft activation
  196. Snapchat hack affects 4.6 million users
  197. SD cards hacked
  198. Neverquest banking malware more dangerous than Zeus trojan
  199. Malware Protection metrics – November results
  200. Alert: Adobe License Key Email Scam
  201. Cryptolocker malware masterminds make around $30 million in 100 days
  202. Tech threats abound beyond spam, malware during holidays
  203. Target: 40M card accounts may be breached
  204. What's the greatest security risk?
  205. Remote webcam activation without warning light confirmed: Johns Hopkin
  206. Effective new Trojan skims card info from widely used ATMs
  207. Cracking RSA 4096-bit encryption with a microphone
  208. Malwarebytes 2013 Threat Report
  209. Fake VPN Site Serves Up Keylogger
  210. Bogus AV program uses 12 stolen digital certificates...
  211. Latest AV Comparatives results
  212. Hacking The Zero-Day Vulnerability Market
  213. Security Professionals: Top Cyber Threat Predictions for 2014
  214. Firms Eliminate Embedded Code To Foil Targeted Attacks
  215. Gmail Image Proxy Change Has Privacy, Security Implications
  216. Cryptolocker: Menace of 2013
  217. 64-Bit Version of Zeus Banking Trojan In The Wild
  218. The five most dangerous email subjects to watch for
  219. Dozens of zero-day flaws exist for exploit daily, report says
  220. PDF, Flash, and Java: the Most Dangerous File Types
  221. Improperly Issued Digital Certificates Could Allow Spoofing
  222. Microsoft, the FBI, Europol disrupt the notorious ZeroAccess botnet
  223. Researchers discover database with 2M stolen login credentials
  224. The biggest malware, security threats in 2013
  225. Credit card fraud comes of age with advances in point-of-sale botnets
  226. Scientist-developed malware covertly jumps air gaps...
  227. At it again with the phishing messages from MS
  228. Forensics Method Quickly Identifies CryptoLocker Encrypted Files
  229. Bitcoin’s skyrocketing value ushers in era of $1 million hacker heists
  230. 'Neverquest' trojan threatens online banking users
  231. Microsoft: Our protection metrics – October results
  232. Symantec: 'Blackshades' malware still being sold
  233. CryptoLocker gang teams with botnet-builders on ransomware
  234. Cryptolocker lowers ransom demands as Bitcoin price surges
  235. Android, Bitcoin top malware targets, McAfee reports
  236. Cops pay Crylock ransom...
  237. LG smart TV snooping extends to home networks, second blogger says
  238. Microsoft Bringing Message Encryption To Office 365 In Early 2014
  239. New backdoor worm found attacking websites running Apache Tomcat
  240. Warning! Targeted Internet misdirection on the rise
  241. Google strengthens its SSL configuration against possible attacks
  242. Netflix users in danger of unknowingly picking up malware
  243. Backup the best defense against (Cri)locked files
  244. Mobile malware reported riding on Google messaging service
  245. Exclusive: FBI warns of U.S. government breaches by Anonymous hackers
  246. “We still don’t encrypt server-to-server data,” admits Microsoft
  247. UK Police warn SERIOUS RANSOMWARE attack against UK users
  248. Cybercriminals target Silverlight browser plug-in users
  249. Researchers hack Internet Explorer 11 and Chrome at Mobile Pwn2Own
  250. Microsoft: IE Patch Tuesday vulnerabilities not actually patched