: Computer Security News

Pages : 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24

  1. Syrian Electronic Army hacks Forbes, spills 1M user records - here's what you need to
  2. Attackers Can Use Computrace Anti-Theft Tool to Remote Wipe PCs
  3. Update on the Linksys Router Worm, a Fix, and Further Actions
  4. Bitcoin Theft in the Underground
  5. Kickstarter hacked, user data stolen
  6. Thousands of FTP sites compromised to serve malware and scams
  7. Microsoft enters into new global partnerships in fight against cybercrime
  8. IE 0-day used in watering hole attack tied to previous campaigns
  9. Bogus Microsoft "Reactivate Your Email Account" emails doing rounds
  10. The sad state of cyber security readiness
  11. 10 tips for spotting a phishing email
  12. One-ring Phone Scams on the Rise
  13. Data Privacy: It's Easy As One-Two-Three
  14. Hackers targeting non-browser applications with Fake SSL Cerificates
  15. What is the Link Between Processors and Security?
  16. The #1 lesson you can learn from Craigslist’s focus on online privacy
  17. Microsoft Malware Protection Centre.
  18. "The Mask" Espionage Malware
  19. How to Unpack a Self-Injecting Citadel Trojan
  20. Epic Target hack reportedly began with malware-based phishing e-mail
  21. 2013 Microsoft Computing Safety Index
  22. Tech support scams: Show me the money
  23. 1 trillion trackers blocked by DNTMe community; use hashtag #dnt1trillion
  24. Half of children left exposed to online threats as parents fail...
  25. Security update available for Adobe Shockwave Player (APSB14-06)
  26. Microsoft adds critical IE, XP fixes to Tuesday's patch slate
  27. Snapchat Flaw Lets Attackers DDoS Your Phone
  28. Software Security Coming Soon to Vehicles
  29. Bug in BitCoin Software Discovered
  30. Microsoft Security Bulletin Advance Notification for February 2014
  31. Pwn2Own security contest offers $645,000 in prizes
  32. Payments experts assure Senate that swipe-and-sign cards will disappear in 2015
  33. UK woman jailed for trolling herself, trying to pin it on family
  34. Patch times improved in 2013, security analysis reports
  35. Exposed: Barclays account details for sale
  36. Compliance Is Not Real Security. Our Credit Cards Deserve Better
  37. Cryptolocker scambles US law firm's entire cache of legal files
  38. How to Call Ransomware's Bluff
  39. How Facebook leaked thousands of private messages all because of a typo
  40. First there were CAPTCHAs, now there are GOTCHAs
  41. Cleanest Countries/Regions Jump to the Top of Our Podium
  42. Malwarebytes Now Accepts Bitcoins!
  43. The fight for data privacy: what developments are in the works
  44. Comcast web mail servers hacked, all users at risk
  45. Going Phishing On A Facebook Apps Page
  46. Target hackers reportedly used credentials stolen from ventilation contractor
  47. A Look at Malware with Virtual Machine Detection
  48. iFrame attack injects code via PNGs
  49. Weak passwords and ancient software left U.S. Government data vulnerable, DHS report
  50. Microsoft Security Bulletin Advance Notification for February 2014
  51. GFI Releases Report on 2013 Vulnerabilities
  52. Chrome to warn of possible settings hijack
  53. Firefox 27: Faster, more secure and more social
  54. Security updates available for Adobe Flash Player
  55. Tumblr activates SSL, but with a catch
  56. Pwn2Own hack contest puts record $645,000 on prize table
  57. What a fake antivirus attack on a trusted website looks like
  58. What’s the Best Antivirus and How Do I Choose One?
  59. Could your TV really spam you?
  60. Data Breaches Hit All Time High In 2013
  61. Teens expelled in keylogging of school computers
  62. Happy privacy news even paranoids could love
  63. UK filters to safeguard children block wrong sites -- report
  64. ‘Honey Encryption’ foils hackers with false positive data
  65. Mobile users at risk from lack of HTTPS use by mobile ad libraries, security research
  66. Chrome fights back against settings hijackers
  67. Time to put microchips in credit cards
  68. WinPatrol 2014 CPU: Can You See Me Now
  69. Free Antivirus Products Rule the World
  70. 12 privacy-destroying technologies that should scare you
  71. How I lost my $50,000 Twitter username
  72. Yahoo Mail accounts breached with stolen passwords
  73. Facebook: The Privacy Challenge
  74. Target hackers may have exploited backdoor in widely used server software
  75. Gmail bug made some users accidentally delete emails
  76. Fully functional trojanized FileZilla client steals FTP logins
  77. VPN bypass vulnerability affects Android Jelly Bean and KitKat
  78. Cross-Platform Java bot found
  79. Malwarebytes Anti-Malware 2.00 Beta Test -- DOWNLOAD
  80. Data Privacy Day 2014: kicking off the most important year for online privacy
  81. Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices
  82. SpyEye malware inventor pleads guilty to bank fraud
  83. Malwarebytes Unpacked Survey
  84. Bug, not DDoS, took down US court systems - just like Gmail
  85. Suspected email hackers for hire charged in four countries
  86. Threat forecast for 2014: Ransomware, scams, snoops
  87. Craft store Michaels may be latest mega-retailer to get hacked
  88. Why Is Spam Still A Problem?
  89. Google lays $2.7 million on the line for Pwnium hacking contest
  90. Samsung patches store site for account takeover bug
  91. Hacktivism Investigation of password crackers busts site feds say hacked 6,000 ...
  92. Microsoft investigating phishing attacks against employees, law enforcement inquiries
  93. Mobile Hardware Security to Take in $1 Billion This Year
  94. Authentication bypass bug exposes Foscam webcams to unauthorized access
  95. Five predictions for information security and cybercrime in 2014
  96. WhatsApp gets Rogue Download Page
  97. Facebook Bug Bounty Program Pays Highest Reward to Date
  98. Snapchat Spam Caused by Lax Security, Not by Rapid Growth
  99. Bitcoin wallets: How to protect your digital currency
  100. Fake Picasa Mails Lead to Viagra Spam Sites
  101. Scientists detect “spoiled onions” trying to sabotage Tor privacy network
  102. Global cybercrime dominated by 50 core groups, CrowdStrike report finds
  103. Cyber attack that sent 750k malicious emails traced to hacked refrigerator, TVs ...
  104. 16 million email addresses and passwords in Germany exposed by malware attack
  105. Web scammers go too far: They're using cute doggie pics
  106. Did Microsoft actually put 'get repeatedly pwned by Syrian hackers' on its 2014...
  107. Privacy tools used by 28% of the online world, research finds
  108. Malicious Acquisition vs Moral Development
  109. Internet users ditch “password” as password, upgrade to “123456”
  110. Warning: Your Browser Extensions Are Spying On You
  111. Redmond researchers profile Skype scammers
  112. WinPatrol 2014 Preview on Monday
  113. How to Send Dodgy-Looking Legitimate Emails, Target-Style
  114. Microsoft will furnish malware assassin to XP users until mid-2015
  115. Amazon is a hornet’s nest of malware
  116. ATMs Face Deadline to Upgrade From Windows XP
  117. Malware makers turn to cloud
  118. Jan 14 The Adventures of a Cybercrime Gumshoe
  119. The Cybersecurity Risk Paradox: Measuring the Impact of Social, Economic...
  120. Adware vendors buy Chrome Extensions to send ad- and malware-filled updates
  121. 10 Incredibly Simple Things You Can Do To Protect Your Privacy
  122. Amazon and GoDaddy are the biggest malware hosters
  123. TrueCrypt Master Key Extraction And Volume Identification
  124. Google must face UK courts over Safari tracking
  125. SERT Threat Intelligence Report Uncovers Disturbing Trends
  126. Java, Android were THE wide-open barn doors of security in 2013 - report
  127. Cisco fixes remote access vulnerabilities in Cisco Secure Access Control System
  128. Improperly Issued Digital Certificates Could Allow Spoofing
  129. Kaspersky Named Antivirus Tsar
  130. How RAM Scraper Malware Stole Data from Target, Neiman Marcus
  131. Microsoft: Windows XP anti-malware support to last into 2015
  132. Microsoft confirms Syrian Electronic Army hacked into employee email accounts
  133. Is your car spying on you?
  134. Boaxxe adware: ‘A good ad sells the product without drawing attention to itself’
  135. Attention Shoppers! Top tips for defending your accounts against card fraud
  136. More than money, bitcoin's real value lies in its algorithms
  137. Major cyber attacks ‘can be predicted’ using computer model, researchers claim
  138. Security Updates available for Adobe Reader and Acrobat
  139. New cyber-attack model helps predict timing of the next Stuxnet
  140. Less than half of consumers take ANY steps to stay safe online, UK government survey
  141. Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
  142. Oracle Critical Patch Update Advisory - January 2014
  143. With the new year comes a new wave of ransomware
  144. Dropbox works to resolve service hiccups, says files safe
  145. Hackers pilfer credit card data from Neiman Marcus customers
  146. Microsoft Twitter accounts hacked by SEA
  147. Just how secure is that mobile banking app?
  148. Default settings leave external hard drives connected to Asus routers wide open
  149. Yahoo's malware-pushing ads linked to larger malware scheme
  150. Oracle to patch Java, other products Tuesday
  151. $100 malware kit lets anyone build their own CryptoLocker
  152. Advance Notification Service for the January 2014 Security Bulletin Release
  153. Reminder! The Risk of Running Windows XP After Support Ends April 2014
  154. Yahoo malware turned PCs into Bitcoin miners
  155. Microsoft cancels Security Essentials for Windows XP
  156. The Antivirus Industry Must Focus on Behavior-Based Detection
  157. Security analysis of mobile banking apps reveals significant weaknesses
  158. Snapchat blurts out the S-word
  159. Encryption is Loud and the Walls Have Ears
  160. Should you switch to a supersecure operating system?
  161. Windows zero-day vulnerability targeted embassies, used email referencing Syrian....
  162. Yahoo enables default HTTPS encryption for Yahoo Mail
  163. Cybercrooks developing dangerous new file-encrypting ransomware, researchers warn
  164. McAfee: "Worst Software on the Planet" Gets a Rebranding
  165. Life is a breach, and then you’re pwned
  166. Lock Down Your Wi-Fi Network With Your Router’s Wireless Isolation Option
  167. Should we care if over a million schoolkids have been fingerprinted?
  168. Researchers warn of new, meaner ransomware with unbreakable crypto
  169. recent best antivirus for windows PC
  170. "Followup phish" targets possible victims of last month's JP Morgan Chase card breach
  171. 2013: a View to a Scam
  172. Yahoo users exposed to malware attack
  173. Steer Clear of These “Free £250 ASOS Gift Voucher” Sites
  174. OpenSSL website defacement - it wasn't a HYPERVISOR HACK after all
  175. Don’t Want Your Laptop Tampered With? Just Add Glitter Nail Polish
  176. Hacktivism Backdoor in wireless DSL routers lets attacker reset router, get admin
  177. Could new malware steal data from INSIDE your SD card? Researchers claim even solid-s
  178. Cybersecurity forces align as FireEye acquires Mandiant
  179. Windows Error Reporting Exposes Your Vulnerabilities
  180. CryptoLocker creeps lure victims with fake Adobe, Microsoft activation codes
  181. Does Facebook Reveal All?
  182. Skype Blog Hacked To Tell People Not To Use Microsoft Email
  183. Snapchat hack affects 4.6 million users
  184. Protecting Your Privacy From Corporations, The Government And You
  185. Hackers knock League of Legends offline
  186. Top Ten Info-Security "Oops" Moments of 2013
  187. Criminals pilfer ATMs with malware infected USB drives
  188. Significant Security Stories of 2013
  189. SD cards hacked
  190. Neverquest banking malware more dangerous than Zeus trojan
  191. NSA Hackers Get the ‘Ungettable’ With Rich Catalog of Custom Tools
  192. Mobile Threat Monday: A Look Back
  193. Phishing for Tesco Shoppers
  194. Why NSA spied on inexplicably unencrypted Windows crash reports
  195. Hacker tried to sell access to BBC server -- report
  196. Predictions: Securing, Protecting the Internet of Things
  197. Festive season spammers offer some cutting criticism to the Naked Security crew...
  198. Vulnerability Found in Samsung’s Galaxy S4
  199. Malware Protection Center Threat Research & Response Blog
  200. Reputation-Based Malicious URL Blocking Offers Effective Protection
  201. On tech support duty for family at Christmas? Get our free Threatsaurus...
  202. Snapchat exploit may let hackers connect names and phone numbers in bulk
  203. Microsoft Wants To Get Rid of Passwords, Joins Group
  204. Typo Trouble in Bitcoin Land
  205. Web server malware for Nginx, Apache advertised on underground market
  206. Predictions: Cyber-Security in 2014
  207. Who’s Selling Credit Cards from Target?
  208. Snowden to warn Brits on Xmas telly: Your children will NEVER have privacy
  209. Spammers take over Twitter Trends with sexy hashtags
  210. Target Could Be Liable for $3.6 Billion from Security Breach
  211. Have you been pwned? Now you can be automatically told when you are!
  212. The OpenSSL software bug that saves you from surveillance!
  213. Typos online aren't just a hassle,they're a hazard
  214. Non-US Cards Used At Target Fetch Premium
  215. Less phishing, but better targeting in 2013, report says
  216. Only In New York: The Unique SMS Spam of The Big Apple
  217. Microsoft Security Essentials fails to detect more than one third of malware
  218. Adobe Cautions Users Against License Key Phishing Scam
  219. Gone Phishing For The Holidays
  220. Gamers Must Level Up To Beat Malware Baddies
  221. Microsoft Security Bulletin MS13-096 - Critical
  222. Microsoft’s Perspective on the NIST Preliminary Cybersecurity Framework
  223. BitTorrent develops secure, decentralized chat program using public-key crypto
  224. Microsoft Security Intelligence Report desktop application updated ...
  225. IBM’s security expert explains why ‘Steve’ might watch your eating habits to keep ...
  226. Tech threats abound beyond spam, malware during holidays
  227. What's the greatest security risk?
  228. Cryptolocker ransom Trojan infected 250,000 PCs, Dell SecureWorks estimates
  229. Effective new Trojan skims card info from widely used ATMs
  230. Microsoft Security Bulletin MS13-098 - Critical
  231. 4 ways network virtualization improves security
  232. Beware: MacBook Webcams can be used to covertly spy on people
  233. Target customers' card data said to be at risk after store thefts
  234. Botnet forces infected Firefox users to hack the sites they visit (updated)
  235. ESET’s Threat Trends Predictions 2014
  236. The Case for a Compulsory Bug Bounty
  237. Fake VPN Site Serves Up Keylogger
  238. Microsoft Security Bulletin MS13-054 - Critical
  239. Good Time for the Good Guys: Eight Perfect Scores in Latest Android Antivirus Test
  240. Attackers exploited ColdFusion vulnerability to install Microsoft IIS malware
  241. Exponential algorithm making Windows XP miserable could be fixed
  242. Vendor security patches lag dangerously, study suggests
  243. Gmail takes image loading out of users' hands - here's how to take it back
  244. Bogus AV program uses 12 stolen digital certificates to make the malware look legit
  245. Be a real security pro - Keep your private keys private
  246. Spammers Target BitCoin Wallets
  247. SMS Activated Flash Downloads: A Digital Leap of Faith
  248. File extensions
  249. Security alert: Bitcoin Alarm app is carefully cloaked malware
  250. Hacked Via RDP: Really Dumb Passwords