PDA

View Full Version : Security News


Pages : [1] 2 3 4 5 6 7 8 9 10

  1. Convincing YouTube look-alike fires RIG Exploit Kit
  2. Reveton ransomware has dangerously evolved
  3. Retailers warned to act now to protect against Backoff malware
  4. New malvertising campaign hit visitors of several high-profile sites
  5. Protect your devices with a $10 'USB Condom'
  6. Security Bulletin MS14-045 rereleased
  7. Side-Channel Android Weakness Likely on Other Platforms
  8. Sub-domain on SourceForge redirects to Flash Pack Exploit Kit
  9. Tech Support scammers rip big brand security software with fake warn..
  10. Mobile apps could be abused to make expensive phone calls
  11. Can Your Home be Hacked? Possibly.
  12. PlayStation Network Suffers DDOS Attack, Hackers Claim To Have...
  13. Gmail, other Android apps hacked with 92% success rate
  14. US warns 'significant number' of major businesses hit by Backoff
  15. US universities at greater risk for security breaches than retail...
  16. 68 percent of top free Android apps vulnerable to cyberattack...
  17. Stealing encryption keys through the power of touch
  18. Researchers find it’s terrifyingly easy to hack traffic lights
  19. 7 Scary Things Employees Can Do With Their Mobile Devices
  20. Slapdash SSL code puts tons of top Android Play Store apps in hack...
  21. New attacks secretly use smartphone cameras, speakers and microphones
  22. New ZeroLocker crypto-ransomware offers discount for paying up quickly
  23. The fall of rogue antivirus software brings new methods to light
  24. Fake Evernote Extension Serves Advertisements
  25. Many Chrome browser extensions do sneaky things
  26. Microsoft Goes From Cellar to Stellar in New Antivirus Test
  27. Phishing emails used to hack US Nuclear Regulator
  28. Mobile Threat Monday: Krysanec RAT Spies On Your Android
  29. UPS Store hit with malware attack in 51 franchised locations
  30. Norton security suites will get a major overhaul in Sept.
  31. August 2014 Security Bulletin Webcast and Q&A
  32. Six ways to secure your vulnerable network router
  33. Beware of fake "Gmail suspicious login" warnings
  34. CloudBot: A Free, Malwareless Alternative To Traditional Botnets
  35. The Gyroscopes in Your Phone Could Let Apps Eavesdrop on Conversations
  36. No surprise, IoT devices are insecure
  37. Microsoft Postpones IE's Java Blocking After IT Complains
  38. Kovter Blackmail Trojan Hunts for Victims as CryptoLocker Fades
  39. New Gameover Zeus botnet keeps growing, especially in the US
  40. Ancient Stuxnet Flaw Still Being Used to Attack Millions of Windows XP
  41. Heartbleed exposes weaknesses in hardware design
  42. Vast majority of hackers believe they're above the law -- survey
  43. Why spammers persist despite filters and well-informed users
  44. Chrome’s Safe Browsing Tool Now Also Protects You From Downloading...
  45. Users told to patch critical flaw in Adobe Reader and Acrobat
  46. Google tightens Gmail spam filtering
  47. How to securely overwrite deleted files with a built-in Windows tool
  48. Can Your Security Software Block Exploit Attacks?
  49. MSRT August - Lecpetex
  50. Home routers supplied by ISPs can be compromised en masse
  51. Behind the CryptoLocker Disruption
  52. Turning a Nest Smart Thermostat Into a Data-Stealing Spy in 15 Seconds
  53. Serious flaws in cell phone carrier control software found
  54. Critical bug in WordPress plugin allows site hijacking
  55. A new generation of ransomware
  56. Obfuscated malicious office documents adopted by cybercriminals around
  57. The echo of Stuxnet
  58. How Malware Writers Cheat AV Zero-Day Detection
  59. How hackers used Google in stealing corporate data
  60. Hacker Redirects Traffic From 19 Internet Providers to Steal Bitcoins
  61. OpenSSL, critical encryption component, gets nine software fixes
  62. Seven ways DARPA is trying to kill the password
  63. In major shift, Google boosts search rankings of HTTPS-protected sites
  64. Malware Analysis of the Lurk Downloader
  65. Sysinternals new Sysmon tool looks for intruder traces
  66. US Homeland Security data possibly stolen in cyberattack
  67. Top gov't spyware company hacked; Gamma's FinFisher leaked
  68. Smart Building Technologies Could Expose Companies To A New Breed Of..
  69. Russian Hackers Amass Over a Billion Internet Passwords
  70. Cryptolocker victims to get files back for free
  71. Multi Function p0wnage just getting worse, researcher finds
  72. Hacker says to show passenger jets at risk of cyber attack
  73. Researcher says PayPal's two-factor authentication is easily beaten
  74. Are You Using The Most Secure Web Browser?
  75. Stealthy, tricky 'Poweliks' malware hides in your system registry,
  76. New GameOver Zeus Variant Generates 1,000 Domains Daily
  77. Citadel Malware Variant Allows Attackers Remote Access, Even After...
  78. Canada joins US in openly accusing China of state-sponsored hacking
  79. Mozilla Developer Network Database Disclosure
  80. 'Energetic' Bear Under The Microscope
  81. Some Security Tools Fail With Multipath TCP
  82. Hacker group targets video game companies to steal source code
  83. Tor points finger at US researchers after possible compromise of...
  84. Attackers exploit remote access tools to compromise retail systems
  85. Android vulnerability still a threat to many devices nearly two years
  86. Hackers Can Control Your Phone Using a Tool That’s Already Built Into
  87. Yes, Hackers Could Build an iPhone Botnet—Thanks to Windows
  88. Android's factory data reset comes up short
  89. FTP remains a security breach in the making
  90. DarkMatter: Curing the internet of digital threats
  91. Attackers can easily create dangerous file-encrypting malware...
  92. New Enhanced Mitigation Experience Toolkit (EMET) 5.0
  93. US warns of 'Backoff,' latest entry into POS malware market
  94. BadUSB: Big, bad USB security problems ahead
  95. How anyone can hack your Instagram account
  96. Zero-day flaws found in Symantec's Endpoint Protection
  97. Attackers use domino effect to compromise your accounts
  98. Good News for Malewarebytes
  99. Another day, another sensationalist, unfounded security story
  100. Anatomy of an iTunes phish - tips to avoid getting caught out
  101. Panopticlick reveals the cookie you can't delete
  102. Virtual servers still face real security threats
  103. 14 antivirus apps found to have security problems
  104. Android Features Used Maliciously
  105. Internet of things big security worry, says HP
  106. Firefox adds anti-malware file reputation service
  107. Firefox slams Chrome again in our trustworthy browser poll
  108. IE was the most vulnerable web browser in the first half of 2014
  109. CBI arrests hacker for stealing Microsoft product keys
  110. Did Malwarebytes Get a Fair Shake?
  111. 'Canvas fingerprinting' online tracking is sneaky but easy to halt
  112. Improving Malware Detection in Firefox
  113. Firefox 31 has arrived - 11 bulletins, 3 critical, 0 visual surprises
  114. File-encrypting Android ransomware's extortion attempts mimic FBI
  115. Dirty Dozen Spampionship – which country is spewing the most spam?
  116. The world's most secure OS may have a serious problem
  117. Researcher sat on critical IE bugs for THREE YEARS
  118. iOS backdoor? Yes... No... Diagnostics!!
  119. The Web never forgets: Persistent tracking mechanisms in the wild
  120. Backup your data now: New, more powerful ransomware using Tor spotted
  121. IBM Fixes Code Execution, Cookie-Stealing Vulnerabilities in Switches
  122. HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads
  123. Backdoors and surveillance mechanisms in iOS devices
  124. How elite hackers (almost) stole the NASDAQ
  125. WordPress plugin vulnerabilities affect 20 million downloads
  126. Pushdo Trojan outbreak: 11 THOUSAND systems infected in just 24 hours
  127. Real-World Antivirus Protection Test: Winners and Losers
  128. Government-grade malware in hacker hands
  129. Almost a million fake apps are targeting your phone
  130. Multiple Cisco home products vulnerable to exploit
  131. CNET user database stolen by Russian hacking group, auctioned for $600
  132. How to burn a password into your brain
  133. Arrests made after keyloggers found on public PCs at US hotels
  134. Google “Project Zero” hopes to find zero-day vulnerabilities before...
  135. Advanced Evasion Techniques wreaking havoc on network security
  136. Fake Google Messenger Reads Your Texts, Records Your Calls
  137. Beware Keyloggers at Hotel Business Centers
  138. The game isn’t over yet for Gameover malware
  139. “Severe” password manager attacks steal digital keys and data en masse
  140. Gmail users on iOS at risk of data interception
  141. LastPass Finds Security Holes In Its Online Password Manager...
  142. Oracle to release 115 security patches
  143. Cyberwarfare, you never know who is in control...
  144. Google changing Chrome malware, phishing warnings
  145. Evolving Zeus malware used in targeted email attacks
  146. Emergency Windows update revokes dozens of bogus Google, Yahoo SSL...
  147. International law enforcement operation disrupts Shylock banking malwa
  148. Adobe Flash: The most INSECURE program on a UK user's PC
  149. Your favorite mobile apps leave a trail of cookie crumbs
  150. Crypto certificates impersonating Google and Yahoo pose threat...
  151. Botnet brute-forces remote access to point-of-sale systems
  152. Security Advisory 2982792 released, Certificate Trust List updated
  153. Chinese hackers are infecting shipping scanners
  154. Patch alert: Update browsers' Flash ASAP to block log-on theft
  155. Vulnerability in AVG security toolbar puts IE users at risk
  156. Fridge hacked. Car hacked. Next up, your LIGHT BULBS
  157. Microsoft increases Outlook and OneDrive security and opens a transpar
  158. Attack on Dailymotion redirected visitors to exploits
  159. Norton Security (NIS & NAV) Beta released.
  160. Inside the secret digital arms race: Facing the threat of a global cyb
  161. Five WordPress Plugins You Should Update Right Now
  162. Your Android phone is a SNITCH: Wi-Fi bug makes you easy to track
  163. Conficker: Still spamming after all these years
  164. Microsoft slates critical IE, Windows patches for Tuesday
  165. The scary truth about data security with wearables
  166. Secret code indicates NSA tracks users of privacy tools, report says
  167. CosmicDuke will steal your login data and own your network
  168. RSA: Brazil's 'Boleto Malware' stole nearly $4 billion in two years
  169. Cybercrooks breed SELF-CLONING MUTANT that STEALS your BANK DETAILS
  170. How to spot and avoid installing potentially unwanted programs
  171. Millions of dynamic DNS users suffer after Microsoft seizes No-IP...
  172. Active malware operation let attackers sabotage US energy industry
  173. New malware program hooks into networking APIs to steal banking data
  174. Microsoft takes on global cybercrime epidemic in tenth malware...
  175. Comcast XFINITY WiFi: Just say no
  176. Rare text message worm targets Android devices
  177. Serious Android crypto key theft vulnerability affects 10% of devices
  178. Running WordPress? Got webshot enabled? Turn it off or you’re toast
  179. Up to 5 million Android users have malware issues
  180. Researchers bypass PayPal's two-factor authentication system
  181. Phishy Steam Guard File Steals SSFN
  182. Hackonomics: Cybercrime's cost to business
  183. Luuuk Trojan snatches €500,000 from European bank in one week
  184. Update to Microsoft Update client
  185. Real Time Cyber Attack Map
  186. Nearly 80 Percent of Flappy Bird Clones Contained Malware
  187. App clones help spread malware, study reveals
  188. Researchers expect surge of rootkits targeting 64-bit PCs
  189. How governments devise custom “implants” to bug smartphones
  190. Researchers Go Inside HackingTeam Mobile Malware, Command Infrastructu
  191. The ‘Fly’ Has Been Swatted
  192. Battling The Bot Nation
  193. New Havex malware variants target industrial control system and SCADA
  194. Google Glass Snoopers Can Steal Your Passcode With a Glance
  195. Fake Amazon Local Emails Deliver Malware
  196. Even encrypted Web traffic can reveal highly sensitive information
  197. Driving a Collectively Stronger Security Community with Microsoft...
  198. Dropbox becomes a vehicle for ransomware
  199. IE users get new protection against potent form of malware attack
  200. Thousands of Ottawa bureaucrats fail phishing scam test
  201. The EFF wants to improve your privacy by making your Wi-Fi public
  202. Heartbleed Isn’t Dead Yet
  203. What's next for ransomware? Cryptowall picks up where CryptoLocker...
  204. Password protected Zbot malware in the wild
  205. Advanced Exploit Techniques Attacking the IE Script Engine
  206. Darkness Still Lurks
  207. Dyreza - The Banking Trojan is Back
  208. ZeroAccess Botnet: Is It Preparing Its Next Attack?
  209. Heartbleed was just the beginning as more vulnerabilities appear
  210. Android 4.4.4 Fixes OpenSSL Connection Hijacking Flaw
  211. Interactive exploit kit redirection technique
  212. Following TrueCrypt’s bombshell advisory, developer says fork is...
  213. Bank not liable for customer's $440,000 cybertheft
  214. Thousands of secret keys found in Android apps
  215. iOS Safer Than Android? Maybe Not
  216. Hackers use YouTube to sell stolen credit card numbers, group says
  217. New powerful banking malware called Dyreza emerges
  218. Hostile state-sponsored hackers breached government network
  219. People will happily run malware if paid ONE CENT – new study
  220. Android smartphone shipped with spyware
  221. The paranoid computer user's guide to privacy, security and encryption
  222. Intelligence firm Stratfor wasn't very smart about data security
  223. Android Ransomware Encrypts Your Files. Don't Pay Up!
  224. Microsoft releases Security Advisory 2974294
  225. Microsoft strips some Windows 7 users of IE11 patch privileges
  226. Why online tracking is getting creepier
  227. AT&T breach allowed customer data to be used to unlock smartphones
  228. Hacker claims PayPal loophole generates FREE MONEY
  229. Nasty mobile banking Trojan gets ransomware features, starts targeting
  230. Online Trust 2014 Honor Roll - Twitter & American Greetings
  231. Malwarebytes: With Anti-Exploit, we'll stop the worst attacks on PCs
  232. Gmail Bug Could Have Exposed Every User’s Address
  233. The life and untimely demise of TrueCrypt
  234. Feedly, Evernote And Others Become Latest Victims Of DDoS Attacks
  235. Powerful worm on Twitter unleashes torrent of out-of-control tweets
  236. Israel develops wireless-malware-injection-by-smartmobe tool
  237. Poison PDF pusher released to public
  238. Malware uses Windows security feature to block security software
  239. Adobe updates Flash, fixes several vulnerabilities
  240. Redmond patches 66 flaws on Patch Tuesday
  241. Microsoft withholds monster IE update from Windows 8.1 dawdlers
  242. Play Store Permissions Change Opens Door to Rogue Apps
  243. Report: 2014 DDoS Trends - Botnet Activity is up by 240%
  244. Organised cybercrime groups are now as powerful as nations
  245. Is your PC infected by gameover zeus?
  246. Google app "Nearby" - your presence will be known
  247. You should know about this malware exploit before buying a Smart TV
  248. XPocalypse, not now
  249. A ‘Nightmare Scenario:’ Vodafone Reveals Huge Global Snooping Program
  250. Kaspersky Cyber Stats