: Computer Security News

Pages : 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22

  1. LastPass vs. KeePass
  2. Warning overload? Half of PC users ignore virus alerts ...
  3. Online child abuse study examines nasty new trends including sextortion
  4. Google launches new service to protect against censorship, cyber-attacks
  5. DDoS attacks are likely bombarding the U.S. as we speak
  6. Warning over “risky” behavior of under-12s online – and parents need to take action,
  7. How your online data is being packaged and sold
  8. Tips for tougher passwords
  9. Brace for stronger DDoS attacks, security firm warns
  10. The Price of Online Security
  11. Secure Your Wireless Router: 8 Things You Can Do Right Now
  12. Malcovery Security: The company spammers and phishers hate
  13. Windows RT 8.1 update temporarily pulled due to a “situation”
  14. Skycure Hacked My iPhone To Prove They Can Protect It
  15. The New Age Of Anonymous Email: Why Do You Still Give Yours Out?
  16. You’re infected—if you want to see your data again, pay us $300 in Bitcoins
  17. Security education cuts both ways - why marketers need retraining too
  18. How to risk your job in 7 security mistakes
  19. Dirty Dozen spam sending nations - find where you finished in our Q3 SPAMPIONSHIP cha
  20. A prompt to save the world: new security features against malware in AutoCAD
  21. Hackers Reported Shifting Focus to Web Ports
  22. Cybersecurity where kids are concerned
  23. Webroot Proves 'Secure' Need Not Mean 'Slow'
  24. 10 Years of Patch Tuesdays. Where's the Cake?
  25. Hackers hit PR Newswire, data shows up alongside recently stolen Adobe code
  26. Hard numbers, chilling facts: What the government does with your data
  27. Why Would You Ever Need To Block Calls To Your Phone?
  28. Hackers use botnet to scrape Google for vulnerable sites
  29. Malwarebytes Anti-Malware Mobile has been released!
  30. McAfee Tanks Independent AV Test
  31. Oracle's Critical Patch Update includes 127 fixes, 51 alone for Java
  32. Is cybersecurity by fiat dead on arrival?
  33. 'Jump boxes' improve security, if you set them up right
  34. Phishing is for the birds
  35. Stealthy technique fingerprints smartphones by measuring users’ movements
  36. Security experts recommend safeguards with Chrome personal data store
  37. Yahoo to encrypt webmail sessions by default starting January
  38. Facebook's "Who can look up your timeline by name" privacy tool bites the dust
  39. Security Google Switches On Browser Spy Cam in Chrome
  40. Monday review - the hot 24 stories of the week
  41. Thousands of Sites Hacked Via vBulletin Hole
  42. Cyber-warriors, your country needs you: Governments hit by “shortage” of experts
  43. How your identity gets swiped even if you're careful
  44. Some D-Link routers contain “backdoor” which allows remote access, researcher warns
  45. Biggest data security threats come from inside, report says
  46. What Microsoft Didn't Say on Patch Tuesday
  47. Cryptolocker Ransomware: What You Need To Know
  48. Google May Feature You In An Ad With 'Shared Endorsements' (Unless You Opt-Out)
  49. Fake support phone calls could lead to identity theft
  50. Abusing data should be a felony
  51. Top sites (and maybe the NSA) track users with “device fingerprinting”
  52. Destructive malware "CryptoLocker" on the loose - here's what to do
  53. Microsoft supports continuing work toward a Do Not Track standard
  54. How to prevent sextortion threats via a compromised webcam
  55. Security tips for digital nomads
  56. Goodbye, tracking cookies? Don't celebrate just yet
  57. Adobe's source code was parked on hackers' unprotected server
  58. Internet Explorer 11 Blocker Toolkit
  59. Nordstrom Finds Cash Register Skimmers
  60. Tech Support Scams: Coming to a Mac near you
  61. Online safety is our shared responsibility
  62. Update: Skype being investigated over NSA spying links
  63. Redirect hides browser extension
  64. Cisco patches vulnerabilities in some security appliances, switches, and routers
  65. Google Chrome 'Fails to Protect Sensitive Personal Data'
  66. Security essentials: What is two-factor authentication?
  67. Microsoft Security Bulletin MS13-082 - Critical
  68. ‘Bulletproof’ Hoster Santrex Calls It Quits
  69. FYI > Update is available that enables you to delete outdated Windows updates.......
  70. Fake shopper scam recruits money mules
  71. Microsoft pays out its first $100,000 bug bounty
  72. Google to pay rewards for open-source code security fixes
  73. Fake shopper scam recruits money mules
  74. Our commitment to Microsoft antimalware
  75. Malicious Software Removal Tool (MSRT) October 2013 – Shiotob
  76. 3 essential techniques to protect your online privacy
  77. Vulnerability in Microsoft Antimalware Client Could Allow Elevation of Privilege
  78. Patch Tuesday brings crucial IE fix
  79. Hijacking of AV firms’ websites may be linked to hack on Network Solutions
  80. Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2885084)
  81. Blackhole exploit kit author reportedly arrested, changes already noticeable
  82. Phone charger can place user on malware alert
  83. Security updates available for Adobe Reader and Acrobat
  84. Microsoft pays out $28K to IE bug hunters in its first-ever bounty program
  85. 5 Wi-Fi security myths you must abandon now
  86. Updated! Microsoft Security Bulletin Summary for October 2013
  87. Malwarebytes puts antivirus cleanup program on a USB stick
  88. Beware: Your browsing habits expose privacy preferences
  89. Failure to patch leaves many WordPress sites vulnerable
  90. Who goes there? Voice-recognizing biometrics are set to take off, ...Who goes there?
  91. 7 top tactics of hack attacks
  92. Microsoft Patch Tuesday - get ready for a bumper Tenth Birthday edition!
  93. Breaking bad: Drugs, bots, hackers, and cyber insecurity
  94. NSA using Firefox flaw to snoop on Tor users
  95. The Tor teardown, brought to you by goats, giraffes, and Thor's hammer
  96. Silk Road bust, Adobe breach and Lavabit chutzpah - 60 Sec Security [VIDEO]
  97. Get Cyber Safe
  98. Cheeky Lavabit *did* hand over crypto keys to US government after all ...
  99. Goodbye Microsoft Security Essentials: Microsoft Now Recommends You Use a Third-Party
  100. ZXX: Privacy font
  101. McAfee reveals sharp rise in malware signed with legitimate digital certificates
  102. 'Anonymous attackers' in court over cyber-attacks
  103. New proof-of-concept tool detects stealthy malware hiding in graphics cards
  104. Adobe Servers Hacked, 2.9 Million Customers Affected
  105. Here be dragons: Explorer “in dangerous territory” after public IE exploit release?
  106. Microsoft Security Bulletin Advance Notification for October 2013
  107. Facebook Graph Search can now paw through your posts and status updates
  108. Bitcoin Talk forum hacked hours after making cameo in Silk Road takedown
  109. Privacy xkcd: what’s your personality type?
  110. Yahoo offers its first tepid bug bounty
  111. State-backed hackers: You think you're so mysterious, but you're really not – report
  112. Silent Circle: NIST encryption standards untrustworthy
  113. It’s National Cyber Security Awareness Month! So be aware of an IE 0-Day!
  114. 10 encryption tips for the enterprise
  115. Symantec takes on one of largest botnets in history
  116. SophosLabs prepares for great showing at Virus Bulletin 2013
  117. Getting warmer? New Hotspot 2.0 “could offer safer public Wi-Fi”
  118. Hackers just POURING through unpatched Internet Explorer zero-day hole
  119. Brute-force malware targets email and FTP servers
  120. Forget fingerprints: Your iris is your new identity
  121. Hidden click fraud botnet uncovered
  122. Former Microsoft privacy adviser: 'I don't trust Microsoft now'
  123. British teen accused of massive Spamhaus DDoS attack arrested months ago
  124. WordPress sites stick with vulnerable versions despite worrying rise in attacks
  125. “One click, then boom”: Spear-phishing could “black out” energy companies........
  126. In computers, are random numbers really random?
  127. Java called favorite target for hack attacks this year
  128. Microsoft releases latest Law Enforcement Requests Report - no Skype content...
  129. Hackers target social media, step up mobile attacks
  130. Microsoft’s copyright bots ask Google to hide Microsoft.com links
  131. Copying fingerprints, Firefox trusted, Facebook not, Yahoo recycles - 60 Sec Security
  132. IE zero-day vulnerability exploited more widely than previously thought
  133. Microsoft received 37,000 end-user data requests in first half of year
  134. SIM card hacker: Bug is either 'a backdoor, gross negligence, or both'
  135. Spear-phishing is “super-strain” of bacteria threatening business, investor warns
  136. Walk this way! Forget fingerprints – could our daily habits be the passwords.........
  137. MS Malware Protection Center. Mevade and Sefnit: Stealthy click fraud
  138. French could serve up fines to Google for privacy violation
  139. Evaluating our protection performance and capabilities
  140. For hire: Elite “cyber mercenaries” adept at infecting Windows and Macs
  141. Malicious browser extensions pose a serious threat and defenses are lacking
  142. Thousands of Wordpress blogs compromised to perform DDOS attack
  143. Future cyber attacks could attack medical implants – or wage “psychological war” in v
  144. Rogue iMessage Chat Client Found in Play Store
  145. Microsoft: Security Essentials provides "baseline" protection
  146. End of support for Java SE 6
  147. Win32/Napolar – A new bot on the block
  148. Vanishing rights: stop your online privacy from disappearing
  149. Oracle: We're getting Java security under control
  150. Hacker video shows how to thwart Apple's Touch ID
  151. UK's Get Safe Online? 'No one cares' - run the blockbuster ads instead
  152. Identity theft service planted botnets in LexisNexis, other data providers
  153. Ransomware criminals attack SMEs using strong file encryption, ESET warns
  154. California gives teens an 'eraser button' to hide online skeletons
  155. Yahoo recycled ID users warn of security risk
  156. SkyDrive stumbles, becomes latest cloud app to get glitchy
  157. 'Watering holes' join Java as a major threat to corporate security, says F-Secure
  158. What story do your emails tell about you?
  159. How I hacked SIM cards with a single text - and the networks DON'T CARE
  160. Firefox burns Chrome in our trustworthy browser poll
  161. Internet Explorer Security Flaw Impacting Business Users
  162. Java updates too much of a bother? Maybe online banking's just not for you
  163. New OS X Trojan found and blocked by Apple's XProtect
  164. LinkedIn denies harvesting user email accounts without permission
  165. Banking (Apps) on Google’s Android
  166. Cybercriminals trying new tactics, security body warns ...
  167. Symantec identifes 'Hidden Lynx' as hackers co-op
  168. Can’t keep a bad man down: “Shylock” Trojan returns to attack U.S. banks
  169. Bank robbers pose as IT guys, rig device to slurp £1.3m from Barclays
  170. How Secure Is My Password: The Ultimate Litmus Test
  171. Win Bitcoins, booze and cash! Be the first to crack the iPhone's Touch ID fingerprint
  172. European Commission calls for single privacy law in wake of PRISM snooping
  173. Facebook "Likes" gain constitutional protection for US employees
  174. Patch Monday: A way to avoid more Microsoft Automatic Update fiascos
  175. LinkedIn users sue over service's "hacking" of contacts and spammy ways
  176. How To Make Your Entire Internet Life More Secure In One Day
  177. Defending against web-based malware: Spot the smoke, don't wait for fire
  178. For your security, please email your credit card and driver’s license ...
  179. 'Kissing couple' Trojan sent to slurp fanbois' data...
  180. What Pinterest’s decision to support Do Not Track means for users (and nonusers)
  181. Ahoy, me hearties! Check your almanacks, for today be Talk Like a Pirate Day, arrr!
  182. Microsoft Security Bulletin MS13-023 - Critical
  183. Ransomware Puts Your System To Work Mining Bitcoins
  184. Revoyem Ransomware Sinks to New Low
  185. Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone
  186. Security researchers create undetectable hardware trojans
  187. Surreptitiously Tampering with Computer Chips
  188. Fake card reader “texts” PINs to thieves instantly – and drains bank accounts...
  189. Why You Don’t Need an Outbound Firewall On Your Laptop or Desktop PC
  190. Hacktivism Long passwords are good, but too much length can be a DoS hazard
  191. Meet Hidden Lynx: The most elite hacker crew you’ve never heard of
  192. Security Advisories for Firefox
  193. Microsoft Security Advisory (2887505) Vulnerability in Internet Explorer...
  194. Researchers find new, ultra-low-level method of hacking CPUs...
  195. NIST cybersecurity framework: Your insurance company is watching
  196. NSA snoops on credit card transactions, says report
  197. WHOIS Privacy Plan Draws Fire
  198. Remote Desktop (RDP) Hacking 101: I can see your desktop from here!
  199. How to find out what the data miners know about you
  200. It's about time: Java update includes tool for blocking drive-by exploits
  201. Microsoft's swipe'n'swirl pic passwords LESS secure than PINs, warn researchers
  202. Shame on you! Report shows users lazier than ever about security practices
  203. Tibet-targeting Mac OS malware rears its head again
  204. Microsoft reissues September patches after user complaints
  205. Companies that allow home working “ignore security risks”, report claims
  206. The end? “Passwords are done,” says Google security chief
  207. Dropbox takes a peek at files
  208. Phishing warning after Vodafone hack leaks personal information...
  209. The iPhone 5s fingerprint reader: what you need to know
  210. Firefox Android zero-day allows execution of malicious code
  211. A scam-spotters guide: Ten things your bank will NEVER do – but cybercriminals will
  212. Uncovering an Android botnet involved in SMS fraud
  213. Microsoft confirms stability fixes messed up Outlook 2013
  214. Microsoft botches still more patches in latest Automatic Update
  215. IPhone jailbreakers begin cracking their knuckles over iOS 7
  216. Multiple Oracle and Adobe Product Security Updates are Available – Update Now
  217. Update for Outlook 2013 breaks folder pane
  218. Biz bods STILL don't patch hacker's delight Java and Flash
  219. Microsoft Malicious Software Removal Tool (MSRT) September 2013 - Win32/Simda
  220. Four out of five people are “locked out” of websites due to lost passwords
  221. MaskMe Is Now Your Worldwide Call Blocker: Introducing International Masked Phones
  222. Of course NSA can crack crypto. Anyone can. The question is, how much?
  223. Anatomy of a phish - a "generic mass targeted attack" against WordPress admins
  224. Why should you trust Google, Facebook more than the NSA?
  225. Yahoo: More than 12,000 US data requests led to disclosures more than 11,000 times
  226. Trust no one, advises security expert after NSA revelations
  227. Spooks break most Internet crypto, but how?
  228. Half of Internet users worry over personal info exposed online
  229. Google speeding up end-to-end crypto between data centers worldwide
  230. ‘SBC’ botnet to blame for Tor traffic surge?
  231. Password Generator Magic: Don’t Take On A Difficult Job Alone
  232. Here's how to best secure your data now that the NSA can crack almost any encryption
  233. Microsoft to patch dangerous Outlook hack-by-preview bug next week
  234. Trendnet under fire from FTC over camera security flaws which let hackers spy...
  235. NetTraveler Variant Adds Java Exploits, Watering Hole Attacks to Bag of Tricks
  236. First case of Android Trojan spreading via mobile botnets discovered
  237. Advance Notification Service for September 2013 Security Bulletin Release
  238. “Rogue cellular devices” could allow attackers to block texts, intercept calls...
  239. Faces, gestures, heartbeats - how will the passwords of the future work?
  240. Lawyers report steep rise in employee data theft cases
  241. In a rush? Five two-minute tips to make yourself more secure right now
  242. Improve Your Facebook, Google & LinkedIn Privacy With AVG PrivacyFix
  243. Researchers: Oracle’s Java Security Fails
  244. Syrian Electronic Army Tries to Make Friends with U.S. Marine Corps
  245. Acxiom’s letting you see the data they have about you…kind of
  246. Selecting all PUPs
  247. Hesperbot – A New, Advanced Banking Trojan in the Wild
  248. The perfect security defense is right under our noses
  249. Database of illegal downloaders - are British ISPs to become the "music NSA"?
  250. Facebook spam “earning criminals $200m a year”, researchers claim