: Computer Security News


Pages : 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32

  1. Facebook bug could have DELETED EVERY SINGLE PHOTO
  2. PayPal Phishing Sophistication Growing
  3. Pwned in 7 seconds: Hackers use Flash and IE to target Forbes visitors
  4. February 2015 Office Update Release
  5. KRBTGT Account Password Reset Scripts now available for customers
  6. Scammers Are Using a Fake Version of AdwCleaner to Trick People
  7. Creaking Patch Tuesday’s Viability Rests with Quality, Speed
  8. Researchers bypass Windows security by changing 1 bit
  9. New agency to sniff out threats in cyberspace
  10. Connected Home Security Systems Easy to Hack: HP
  11. Ransomware authors streamline attacks, infections rise
  12. Safer Internet Day 2015: This year, “Do 1 (More) Thing” to stay safer online
  13. Monster IE Update Top Patch Tuesday Priority
  14. Forbes.com infected by hackers in campaign to spy on visitors-researchers
  15. Was SSL3 killed by a POODLE? Surveys says…Maybe!
  16. UK lags US in cyber insurance, study shows
  17. Fearing an FBI raid, researcher publishes 10 million passwords/usernames
  18. Microsoft Security Bulletin Summary for February 2015
  19. Your Samsung SmartTV Is Spying on You, Basically
  20. New spyware steals pictures and data from iOS devices
  21. New DYRE banking malware in the wild
  22. New Adware Found In Google Play Apps With Millions Of Downloads
  23. Detecting zero-day hack in one millisecond with 'power fingerprinting'
  24. Ransomware 2.0 'crypts website databases – until victims pay up
  25. Malicious ads on major sites compromise many computers
  26. Phishers, scammers pile into worried Anthem customers in FRAUD FRENZY
  27. How Tor Was Broken Into (And Why That Doesn't Matter)
  28. DDoS malware for Linux systems comes with sophisticated custom-built rootkit
  29. Get the Drop on…Dead Drops
  30. IE11 zero-day vulnerability hits Windows 7 and 8.1 users
  31. The Facts about Botnets
  32. More iCloud phishing: don't get sucked in
  33. Once-starving GnuPG crypto project gets a windfall. Now comes the hard part
  34. Panda Security restructures for growth
  35. Facebook's DeepFace facial recognition technology has human-like accuracy
  36. Gamers, beware of fake in-game communication apps
  37. BEDEP Malware Tied To Adobe Zero-Days
  38. UK cyber attacker faces jail for targeting public services sites
  39. GCHQ-NSA intelligence sharing unlawful
  40. ISIS Bans Apple iPhones, iPads, iPods In The Caliphate Due To Fears They're Being ...
  41. IT professional, hack thyself
  42. Universal XSS flaw in fully patched Microsoft Internet Explorer exposed
  43. Flash Player 16.0.0.305 Patches Zero-Day Vulnerability
  44. WebRTC in Firefox and Chrome Reveals IPs Behind VPN
  45. As Flash 0day exploits reach new level of meanness, what are users to do?
  46. Google redesigns security warnings after 70% of Chrome users ignore them
  47. Regin malware and NSA’s QWERTY tool exposed as part of the same platform
  48. Google announces ‘Vulnerability Research Grants’
  49. "Exploit This": Evaluating the exploit skills of malware groups
  50. Android Banking Trojan Is Controlled via SMS
  51. DNS Hijack in D-Link Routers, No Authentication Required
  52. Warning -- Microsoft's new iOS Outlook app is insecure
  53. Skype Chats Compromised Syrian Rebels: Researchers
  54. Cyber crime is a threat to global economy, says researcher
  55. Email scammers stole $215M from businesses in 14 months
  56. The GHOST in the machine - 60 Sec Security [VIDEO]
  57. DDoS attacks almost doubled in year: Akamai State of the Internet Security Report
  58. Hackers Compromise Business IM Service HipChat
  59. Safe Practices with Your Mobile Device
  60. New Variant of Dyre Trojan Spreads Upatre Malware via Microsoft Outlook
  61. (New) Security Advisory for Adobe Flash Player
  62. Future airports could become hi-tech pleasure domes
  63. Exploring Control Flow Guard in Windows 10
  64. Dating site Topface pays hacker who stole 20 million credentials
  65. Threatpost News Wrap, January 30, 2015
  66. US military explores ‘cognitive fingerprints’ as alternative to passwords
  67. Google to change UK privacy policy after regulatory pressure
  68. Facebook Malware Poses as Flash Update, Infects 110K Users
  69. Critical Ghost bug could haunt WordPress and PHP apps, too
  70. Jihadists Increasingly Wary of Internet, Experts Say
  71. The Internet of Dangerous Things
  72. Only fall of global firm will shake up cyber security
  73. WhatsApp Web has privacy holes that could expose user photos
  74. World’s most ‘NSA-proof’ phone vulnerable to simple SMS hack
  75. Who runs an anti-virus scan these days? Apparently almost nobody
  76. Google defends policy that leaves most Android devices unpatched
  77. Security of Home Surveillance Cameras
  78. Verizon Wireless placing ‘supercookies’ on customer devices
  79. Exploit Kits: A Fast Growing Threat
  80. AV-Comparatives Names Product of the Year for 2014
  81. Security Experts Unite to Rewrite Proposed Cyber Laws
  82. Low Hanging Fruit: Flash Player
  83. Bug in ultra secure BlackPhone let attackers decrypt texts, stalk users
  84. Flurry of cyberattacks causes concern for Davos elites at World Economic Forum
  85. QinetiQ hosts latest Cyber Security Challenge competition
  86. Maldrone: Malware which hijacks your personal drone
  87. Wireless device in two million cars wide open to hacking
  88. GHOST, a critical Linux security hole, is revealed
  89. The tooth gnashing you hear is from Flash users installing a new 0day patch
  90. Spreading the Disease and Selling the Cure
  91. Lizard Squad claims to have brought down both Facebook and Instagram
  92. Has The Antivirus Industry Gone Mad?!
  93. Microsoft Security Advisory 2755801
  94. Russian Dating Site Topface Hacked for 20 Million User Names
  95. SCADA programmers? It's time for security by default! 60 Sec Security [VIDEO]
  96. Malaysia Airlines website 'compromised' by hackers
  97. Davos Elites Warned About Catastrophic Cyberattacks
  98. Predictions for 2015
  99. Snowden, NSA face off over privacy at Harvard
  100. University of Buffalo study examines the psychology of phishing emails
  101. Apple readies fix for Thunderstrike bootkit exploit in next OS X release
  102. Psychological profile-based security - could it work?
  103. Which Antivirus Offers the Best Protection? AV-Test Reports
  104. Symantec data centre security software has security holes
  105. Internet attack could shut down US gas stations
  106. Blur Account Security: Part II
  107. Google drops three OS X 0days on Apple
  108. (NEW) Adobe Security Bulletin
  109. Attack for Flash 0day goes live in popular exploit kit
  110. VLC vulnerabilities exposed
  111. This tool makes it easier for thieves to empty bank accounts
  112. How a 7-year-old girl hacked a public Wi-Fi network in 10 minutes
  113. New Adobe Flash Zero-Day found in the Wild
  114. Oracle Critical Patch Update Advisory - January 2015
  115. Blur Account Security: Part I
  116. HealthCare.gov Leaks Health Info to Third Parties [AP]
  117. WhatsApp issues 24 hour ban for WhatsApp Plus users
  118. The worst passwords in the world -- is yours on the list?
  119. How Was Your Credit Card Stolen?
  120. CISOs in the Dark on State of Security Readiness: Cisco
  121. Cybercrime deterrence: 6 important steps
  122. A Week in Security
  123. A hacked DDoS-on-demand site offers a look into mind of “booter” users
  124. 1800+ Minecraft usernames and passwords leak online
  125. Microsoft's Use-After-Free Mitigations Can Be Bypassed: Researcher
  126. Microsoft's Outlook email service was under attack in China
  127. Views from around the globe: 2nd Annual Report on How Personal Technology is Changing
  128. Researcher tears apart a Android Password Manager App
  129. Guide on actionable information for security incident response
  130. Cyberjihadists attack thousands of French websites after Charlie Hebdo massacre
  131. Spying on citizens: It's not just for the NSA anymore
  132. Hackers could exploit security holes in Progressive Insurance Snapshot devices
  133. How dating app Grindr makes it easy to stalk 5 million gay men
  134. Hack on PS and Xbox attackers leaks DDoS customers’ plaintext passwords
  135. Lizard Squad’s DDoS Website Gets Hacked, Passwords Stored in Plain Text
  136. Adobe Phish Back in the Wild
  137. Google reveals two more unpatched Windows security bugs
  138. AV-TEST estimates 12 million new malware variants per month
  139. Teen Arrested in UK for Xbox, PlayStation Attacks
  140. Politicians and journalists stung by fake open Wi-Fi protest
  141. Typosquatting abuse of 500 most popular websites analyzed
  142. Need Some Espionage Done? Hackers Are for Hire Online
  143. Microsoft cracks personalisation without prying
  144. Security and Military Experts Fall For "Open" Wi-Fi
  145. New Variant of Carberp Trojan Discovered by Researchers
  146. Have your customers been pwned? Would you like to know?
  147. Release Notes | Flash Player® 16 AIR® 16
  148. “Mac Defender” Scare Used in Tech Support Scams Targeting Mac Owners
  149. Zombie cookie: The tracking cookie that you can’t kill
  150. Adobe Security Bulletin
  151. 4 Mega-Vulnerabilities Hiding in Plain Sight
  152. Beware of malware masquerading as Oracle security patches
  153. A $10 USB charger with built-in wireless keylogger means more security headaches
  154. Skeleton key malware gives attackers control of Windows AD controllers
  155. How to Tell Whether Your Windows PC is Using a Proxy Server
  156. 4 Steps to Mitigate 95% of Known Vulnerabilities
  157. Microsoft Patches Vulnerability Under Attack and Google-Disclosed Zero Day
  158. 'Skeleton Key' malware unlocks corporate networks
  159. January 2015 Updates
  160. United, American airlines account fraud highlights hacker focus on travel industry
  161. A Call for Better Coordinated Vulnerability Disclosure
  162. Popular Game Rental Site Issues Statement on Alleged “Fraudulent Payment Attempts”
  163. 8chan domain “seized” over allegations of “child abuse” content
  164. First Public Mac OS X Firmware Bootkit Unleashed
  165. Google stops providing updates for Android Jelly Bean and lower versions for Webview
  166. Is IT security stifling innovation and collaboration?
  167. Who’s Attacking Whom? Realtime Attack Trackers
  168. Fake email uses ISIS threat to distribute malicious attack
  169. 7 security mistakes people make with their mobile device
  170. "Dear Facebook, I DEMAND that you ignore my demands" - 60 Sec Security [VIDEO]
  171. Judge cites use of secure email Riseup as a potential terrorist indicator
  172. Win7 reaches milestone; prepare for its demise
  173. TorrentLocker Ransomware Hits ANZ Region
  174. Free antivirus scanners for Windows PCs
  175. Google Engineers Critical of Aviator Browser Security
  176. New Year, Old Problems: Large-Scale Dating Site Spam Run Hits Users
  177. Major malvertising campaign spreads Kovter Ad Fraud malware
  178. One Definitive Prediction For 2015
  179. Most Asus routers affected by hijack bug; exploit posted
  180. Fake CNN Twitter Feeds Spam Weight Loss Links
  181. Mobile Phones and Laptops vulnerable to hacking even when not connected to Internet
  182. NSA Director on Sony Hack: ‘The Entire World is Watching’
  183. Bitstamp reopens Bitcoin exchange, adds security precautions
  184. How Windows was exploited in 2014
  185. The Week in Privacy
  186. Holiday hacks down despite record-breaking shopping numbers
  187. HTTPS bent into the next super-cookies by researcher
  188. Email and web scams: How to help protect yourself
  189. FTC chief gives startups warning over Internet of Things privacy
  190. Evolving Microsoft's Advance Notification Service in 2015
  191. SocialPath privacy tool steals data, researchers warn
  192. Privacy notice post spreading on Facebook a hoax
  193. FBI to Disclose Details of Sony Hack Attribution
  194. Thieves Jackpot ATMs With ‘Black Box’ Attack
  195. AOL halts malicious ads served by its advertising platform
  196. Users Report Malicious Ads in Skype
  197. Four cyber security risks not to be taken for granted
  198. Gogo issues fake HTTPS certificate to users visiting YouTube
  199. University researchers concerned with wearable privacy
  200. Is now the time to deploy embedded hypervisors for BYOD security?
  201. CERT Warns of UEFI Hardware Vulnerabilities
  202. New Year, Masked You
  203. Microsoft warns for new malware attacks with Office documents
  204. Bitcoin Exchange Bitstamp hacked; Site Taken Offline
  205. The Government Spent a Lot of Time in Court Defending NSA Spying Last Year: 2014 ...
  206. Morgan Stanley: An employee stole partial client data
  207. The Biggest Security Threats We’ll Face in 2015
  208. The mystery of the missing Bitcoins - 60 Sec Security [VIDEO]
  209. Hackers released Xbox One SDK, claimed unreleased games may be leaked
  210. Come for lulz, stay for hacktivism: a new book on Anonymous, reviewed
  211. Google unveils Windows 8.1 zero-day vuln – complete with exploit code
  212. Before you enable those macros…
  213. New Year's Resolutions for Better Security in 2015
  214. Apple Security Researcher Announces Thunderbolt Threat
  215. Growing European Issues Imperil U.S. Tech Business Models
  216. False Positive: Exploit:JS/HuanJuanEK.A
  217. Malware infection suspected at ISC, providers of the BIND DNS server software
  218. US banks trace credit fraud to Chick-fil-A locales in possible data breach
  219. Potentially Unwanted Program borrows tricks from malware authors
  220. WordPress Symposium Plug-In Plagued by File Upload Vulnerability
  221. Developers must follow security rules, too
  222. FTC finalizes privacy settlement with Snapchat over 'deceived' users
  223. Want to have your server pwned? Easy: Run PHP
  224. Fake QQ Messaging App
  225. Microsoft Ends 2014 with a New Patch for Windows 8.1
  226. US Using Planes Equipped with 'Dirtbox' to Spy on Your Phone Calls
  227. XXE Bug Patched in Facebook Careers Third-Party Service
  228. January 1st Instagram Profile Deletion Hoax
  229. Top Cybersecurity Headlines of 2014
  230. The Week in Privacy
  231. Facebook privacy – network faces court for ‘reading user messages’
  232. EMET your enterprise for peak Windows security
  233. Tor, TrueCrypt, Tails topped the NSA's 'most wanted' list in 2012
  234. The 5 Most Dangerous Software Bugs of 2014
  235. Politician’s fingerprint reproduced using photos of her hands
  236. Prying Eyes: Inside the NSA's War on Internet Security
  237. Sony FINGERS DDoS attackers for ruining PlayStation's Xmas
  238. Most Popular Security Posts Of 2014
  239. Who’s in the Lizard Squad?
  240. Hackers leak 13,000 Passwords Of Amazon, Walmart and Brazzers Users
  241. Vawtrak challenges almighty ZeuS as king of the botnets
  242. Avast Heuristic
  243. The email that caused a literal meltdown - 60 Sec Security [VIDEO]
  244. Spyware abuse – partner tracking reaching “epidemic proportions”
  245. Facebook Users Targeted By Android Same Origin Policy Exploit
  246. U.S. Spy Agency Reports Improper Surveillance of Americans
  247. Hackers target Tor as PlayStation disruption continues
  248. 8 Free Privacy Programs Worth Your Year-End Donations
  249. Hackers damage German factory
  250. Top 10 cyber security stories of 2014