PDA

View Full Version : Security News


Pages : [1] 2 3 4 5 6 7 8 9 10

  1. Shellshock vulnerability tester
  2. Improved patch tackles new Shellshock Bash bug attack vectors
  3. First attacks using 'shellshock' Bash bug discovered
  4. Latest Firefox and Thunderbird updates plug CRITICAL SSL vuln
  5. Experts Say ‘Bash’ Bug Is a Major Vulnerability But Not a Major Threat
  6. Micrsoft has launched a bug bounty program for online services
  7. 'Bigger than Heartbleed': Bash bug could leave IT systems in shellshoc
  8. Meet the Master Boot Record
  9. Credit card data theft hit at least three retailers, lasted 18 months
  10. Adobe releases previously delayed security updates for Reader, Acrobat
  11. Fear not: Kindle flaw that opened your Amazon account to attackers...
  12. 'Tiny banker' malware targets US financial institutions
  13. Android Browser flaw a “privacy disaster” for half of Android users
  14. AV-Comparatives: Real-World Protection Tests August 2014
  15. Hacker exploits printer Web interface to install, run Doom
  16. Tasty Spam: Phishing Isn't Just About Your Money
  17. Turning the tables on “Windows Support” scammers by compromising their
  18. New malware spreads over Twitch chat, targets Steam accounts
  19. Download at your own risk: Bitcoin miners bundled with game repacks
  20. Phishers pose as Cloudhashing to steal your Bitcoins
  21. Fraudulent Netflix site wants to leave you high and dry
  22. Researchers unlock TorrentLocker encryption
  23. Researchers find malicious extensions in Chrome Web Store
  24. Everything you need to know about POS malware
  25. Your configuration files are showing
  26. Researcher disputes report BlackPOS used in Home Depot, Target attacks
  27. Microsoft patch fixed IE flaw used against U.S. military
  28. Vulnerability in popular Joomla e-commerce extension puts online shops
  29. VMware and Cisco patch vulnerabilities in data-center gear and softwar
  30. Privacy lapses riddle majority of mobile apps, data protection...
  31. Sprint, Windstream traffic routing errors hijacked other ISPs
  32. Risk Meets Reward: Windows Phone 8.1 Security Overview
  33. Twitch malware spends users' money
  34. Twitch.tv - Gamers Shamelessly Wiped Clean
  35. Apple Watch Is the Next BYOD Headache for Business
  36. September 2014 Security Bulletin Release Webcast and Q&A
  37. Tabnabbing: A New Type of Phishing Attack
  38. Devastating 'Heartbleed' flaw was unknown before disclosure, study...
  39. Salesforce warns customers of malware attack
  40. YouTube, Amazon and Yahoo! caught in malvertising mess
  41. Adobe fixes critical flaws in Flash Player, delays Reader and Acrobat
  42. Malware blocking app mysteriously pulled from Play Store
  43. CloudAlloy Makes Docs In The Cloud More Secure By Breaking Them Into..
  44. Comcast Wi-Fi serving self-promotional ads via JavaScript injection
  45. Home Depot Finally Confirms Its Payment System Was Hacked For Months
  46. Hackers launch Apple ID phishing campaign playing on iCloud security..
  47. Instagram, Grindr, and more popular Android apps put user privacy at..
  48. 5 million Gmail usernames, passwords posted on Russian forum
  49. Threat Report H1 2014 - F-Secure
  50. September 9th 2014 updates for Internet Explorer
  51. The September 9th 2014 Security Updates
  52. The game is not yet over for Gameover Zeus botnet
  53. Windows XP security
  54. Neverquest Trojan Adds New Targets, Capabilities
  55. Why is Google sending insecure browsers back in time?
  56. “YouTube Account Manager has sent you a Message…”
  57. Home Depot Hit By Same Malware as Target
  58. Where you AT?: Indicators of lateral movement using at.exe on Windows7
  59. New botnet research from Prolexic Research Team
  60. 'Harkonnen' espionage Trojan stole data from 300 European SMBs
  61. Why CryptoWall ransomware will remain a shadow of CryptoLocker
  62. Botnet malware discovered on Healthcare.gov server
  63. Profits, falling crimeware prices driving Chinese cybercrime
  64. Google accelerates end of SHA-1 support; certificate authorities...
  65. These 3-D Printed Skeleton Keys Can Pick High-Security Locks in Second
  66. A Google Site Meant to Protect You Is Helping Hackers Attack You
  67. The FBI Finally Says How It ‘Legally’ Pinpointed Silk Road’s Server
  68. Outages on Facebook, LinkedIn, PayPal, and other sites might point to
  69. Why the CIO should 'own' IT security
  70. Meet the Russian-made tool that grabs nude selfies from iCloud account
  71. Cyberespionage group uses port of Windows backdoor to attack OS X
  72. Just five gangs in Nigeria are behind most Craigslist buyer scams
  73. Prenotification Security Advisory for Adobe Reader and Acrobat
  74. Hackers exploit critical vulnerability in popular WordPress theme...
  75. Malware Can Bypasses Chrome Extension Security Feature Easily
  76. Facebook is rolling out a "privacy checkup" pop-up
  77. 5 things to know about email unsubscribe links before you click
  78. Advance Notification for September 9th 2014 Security Bulletin
  79. Rigged industrial software site points to watering hole attack
  80. Tests compare Mac OS X anti-malware products
  81. CryptoWall ransomware held over 600,000 computers hostage...
  82. Using WPS on Wi-Fi router may be even more dangerous than you think
  83. Convincing YouTube look-alike fires RIG Exploit Kit
  84. Reveton ransomware has dangerously evolved
  85. Retailers warned to act now to protect against Backoff malware
  86. New malvertising campaign hit visitors of several high-profile sites
  87. Protect your devices with a $10 'USB Condom'
  88. Security Bulletin MS14-045 rereleased
  89. Side-Channel Android Weakness Likely on Other Platforms
  90. Sub-domain on SourceForge redirects to Flash Pack Exploit Kit
  91. Tech Support scammers rip big brand security software with fake warn..
  92. Mobile apps could be abused to make expensive phone calls
  93. Can Your Home be Hacked? Possibly.
  94. PlayStation Network Suffers DDOS Attack, Hackers Claim To Have...
  95. Gmail, other Android apps hacked with 92% success rate
  96. US warns 'significant number' of major businesses hit by Backoff
  97. US universities at greater risk for security breaches than retail...
  98. 68 percent of top free Android apps vulnerable to cyberattack...
  99. Stealing encryption keys through the power of touch
  100. Researchers find it’s terrifyingly easy to hack traffic lights
  101. 7 Scary Things Employees Can Do With Their Mobile Devices
  102. Slapdash SSL code puts tons of top Android Play Store apps in hack...
  103. New attacks secretly use smartphone cameras, speakers and microphones
  104. New ZeroLocker crypto-ransomware offers discount for paying up quickly
  105. The fall of rogue antivirus software brings new methods to light
  106. Fake Evernote Extension Serves Advertisements
  107. Many Chrome browser extensions do sneaky things
  108. Microsoft Goes From Cellar to Stellar in New Antivirus Test
  109. Phishing emails used to hack US Nuclear Regulator
  110. Mobile Threat Monday: Krysanec RAT Spies On Your Android
  111. UPS Store hit with malware attack in 51 franchised locations
  112. Norton security suites will get a major overhaul in Sept.
  113. August 2014 Security Bulletin Webcast and Q&A
  114. Six ways to secure your vulnerable network router
  115. Beware of fake "Gmail suspicious login" warnings
  116. CloudBot: A Free, Malwareless Alternative To Traditional Botnets
  117. The Gyroscopes in Your Phone Could Let Apps Eavesdrop on Conversations
  118. No surprise, IoT devices are insecure
  119. Microsoft Postpones IE's Java Blocking After IT Complains
  120. Kovter Blackmail Trojan Hunts for Victims as CryptoLocker Fades
  121. New Gameover Zeus botnet keeps growing, especially in the US
  122. Ancient Stuxnet Flaw Still Being Used to Attack Millions of Windows XP
  123. Heartbleed exposes weaknesses in hardware design
  124. Vast majority of hackers believe they're above the law -- survey
  125. Why spammers persist despite filters and well-informed users
  126. Chrome’s Safe Browsing Tool Now Also Protects You From Downloading...
  127. Users told to patch critical flaw in Adobe Reader and Acrobat
  128. Google tightens Gmail spam filtering
  129. How to securely overwrite deleted files with a built-in Windows tool
  130. Can Your Security Software Block Exploit Attacks?
  131. MSRT August - Lecpetex
  132. Home routers supplied by ISPs can be compromised en masse
  133. Behind the CryptoLocker Disruption
  134. Turning a Nest Smart Thermostat Into a Data-Stealing Spy in 15 Seconds
  135. Serious flaws in cell phone carrier control software found
  136. Critical bug in WordPress plugin allows site hijacking
  137. A new generation of ransomware
  138. Obfuscated malicious office documents adopted by cybercriminals around
  139. The echo of Stuxnet
  140. How Malware Writers Cheat AV Zero-Day Detection
  141. How hackers used Google in stealing corporate data
  142. Hacker Redirects Traffic From 19 Internet Providers to Steal Bitcoins
  143. OpenSSL, critical encryption component, gets nine software fixes
  144. Seven ways DARPA is trying to kill the password
  145. In major shift, Google boosts search rankings of HTTPS-protected sites
  146. Malware Analysis of the Lurk Downloader
  147. Sysinternals new Sysmon tool looks for intruder traces
  148. US Homeland Security data possibly stolen in cyberattack
  149. Top gov't spyware company hacked; Gamma's FinFisher leaked
  150. Smart Building Technologies Could Expose Companies To A New Breed Of..
  151. Russian Hackers Amass Over a Billion Internet Passwords
  152. Cryptolocker victims to get files back for free
  153. Multi Function p0wnage just getting worse, researcher finds
  154. Hacker says to show passenger jets at risk of cyber attack
  155. Researcher says PayPal's two-factor authentication is easily beaten
  156. Are You Using The Most Secure Web Browser?
  157. Stealthy, tricky 'Poweliks' malware hides in your system registry,
  158. New GameOver Zeus Variant Generates 1,000 Domains Daily
  159. Citadel Malware Variant Allows Attackers Remote Access, Even After...
  160. Canada joins US in openly accusing China of state-sponsored hacking
  161. Mozilla Developer Network Database Disclosure
  162. 'Energetic' Bear Under The Microscope
  163. Some Security Tools Fail With Multipath TCP
  164. Hacker group targets video game companies to steal source code
  165. Tor points finger at US researchers after possible compromise of...
  166. Attackers exploit remote access tools to compromise retail systems
  167. Android vulnerability still a threat to many devices nearly two years
  168. Hackers Can Control Your Phone Using a Tool That’s Already Built Into
  169. Yes, Hackers Could Build an iPhone Botnet—Thanks to Windows
  170. Android's factory data reset comes up short
  171. FTP remains a security breach in the making
  172. DarkMatter: Curing the internet of digital threats
  173. Attackers can easily create dangerous file-encrypting malware...
  174. New Enhanced Mitigation Experience Toolkit (EMET) 5.0
  175. US warns of 'Backoff,' latest entry into POS malware market
  176. BadUSB: Big, bad USB security problems ahead
  177. How anyone can hack your Instagram account
  178. Zero-day flaws found in Symantec's Endpoint Protection
  179. Attackers use domino effect to compromise your accounts
  180. Good News for Malewarebytes
  181. Another day, another sensationalist, unfounded security story
  182. Anatomy of an iTunes phish - tips to avoid getting caught out
  183. Panopticlick reveals the cookie you can't delete
  184. Virtual servers still face real security threats
  185. 14 antivirus apps found to have security problems
  186. Android Features Used Maliciously
  187. Internet of things big security worry, says HP
  188. Firefox adds anti-malware file reputation service
  189. Firefox slams Chrome again in our trustworthy browser poll
  190. IE was the most vulnerable web browser in the first half of 2014
  191. CBI arrests hacker for stealing Microsoft product keys
  192. Did Malwarebytes Get a Fair Shake?
  193. 'Canvas fingerprinting' online tracking is sneaky but easy to halt
  194. Improving Malware Detection in Firefox
  195. Firefox 31 has arrived - 11 bulletins, 3 critical, 0 visual surprises
  196. File-encrypting Android ransomware's extortion attempts mimic FBI
  197. Dirty Dozen Spampionship – which country is spewing the most spam?
  198. The world's most secure OS may have a serious problem
  199. Researcher sat on critical IE bugs for THREE YEARS
  200. iOS backdoor? Yes... No... Diagnostics!!
  201. The Web never forgets: Persistent tracking mechanisms in the wild
  202. Backup your data now: New, more powerful ransomware using Tor spotted
  203. IBM Fixes Code Execution, Cookie-Stealing Vulnerabilities in Switches
  204. HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads
  205. Backdoors and surveillance mechanisms in iOS devices
  206. How elite hackers (almost) stole the NASDAQ
  207. WordPress plugin vulnerabilities affect 20 million downloads
  208. Pushdo Trojan outbreak: 11 THOUSAND systems infected in just 24 hours
  209. Real-World Antivirus Protection Test: Winners and Losers
  210. Government-grade malware in hacker hands
  211. Almost a million fake apps are targeting your phone
  212. Multiple Cisco home products vulnerable to exploit
  213. CNET user database stolen by Russian hacking group, auctioned for $600
  214. How to burn a password into your brain
  215. Arrests made after keyloggers found on public PCs at US hotels
  216. Google “Project Zero” hopes to find zero-day vulnerabilities before...
  217. Advanced Evasion Techniques wreaking havoc on network security
  218. Fake Google Messenger Reads Your Texts, Records Your Calls
  219. Beware Keyloggers at Hotel Business Centers
  220. The game isn’t over yet for Gameover malware
  221. “Severe” password manager attacks steal digital keys and data en masse
  222. Gmail users on iOS at risk of data interception
  223. LastPass Finds Security Holes In Its Online Password Manager...
  224. Oracle to release 115 security patches
  225. Cyberwarfare, you never know who is in control...
  226. Google changing Chrome malware, phishing warnings
  227. Evolving Zeus malware used in targeted email attacks
  228. Emergency Windows update revokes dozens of bogus Google, Yahoo SSL...
  229. International law enforcement operation disrupts Shylock banking malwa
  230. Adobe Flash: The most INSECURE program on a UK user's PC
  231. Your favorite mobile apps leave a trail of cookie crumbs
  232. Crypto certificates impersonating Google and Yahoo pose threat...
  233. Botnet brute-forces remote access to point-of-sale systems
  234. Security Advisory 2982792 released, Certificate Trust List updated
  235. Chinese hackers are infecting shipping scanners
  236. Patch alert: Update browsers' Flash ASAP to block log-on theft
  237. Vulnerability in AVG security toolbar puts IE users at risk
  238. Fridge hacked. Car hacked. Next up, your LIGHT BULBS
  239. Microsoft increases Outlook and OneDrive security and opens a transpar
  240. Attack on Dailymotion redirected visitors to exploits
  241. Norton Security (NIS & NAV) Beta released.
  242. Inside the secret digital arms race: Facing the threat of a global cyb
  243. Five WordPress Plugins You Should Update Right Now
  244. Your Android phone is a SNITCH: Wi-Fi bug makes you easy to track
  245. Conficker: Still spamming after all these years
  246. Microsoft slates critical IE, Windows patches for Tuesday
  247. The scary truth about data security with wearables
  248. Secret code indicates NSA tracks users of privacy tools, report says
  249. CosmicDuke will steal your login data and own your network
  250. RSA: Brazil's 'Boleto Malware' stole nearly $4 billion in two years