: Computer Security News

Pages : 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22

  1. Privacy xkcd: what’s your personality type?
  2. Yahoo offers its first tepid bug bounty
  3. State-backed hackers: You think you're so mysterious, but you're really not – report
  4. Silent Circle: NIST encryption standards untrustworthy
  5. It’s National Cyber Security Awareness Month! So be aware of an IE 0-Day!
  6. 10 encryption tips for the enterprise
  7. Symantec takes on one of largest botnets in history
  8. SophosLabs prepares for great showing at Virus Bulletin 2013
  9. Getting warmer? New Hotspot 2.0 “could offer safer public Wi-Fi”
  10. Hackers just POURING through unpatched Internet Explorer zero-day hole
  11. Brute-force malware targets email and FTP servers
  12. Forget fingerprints: Your iris is your new identity
  13. Hidden click fraud botnet uncovered
  14. Former Microsoft privacy adviser: 'I don't trust Microsoft now'
  15. British teen accused of massive Spamhaus DDoS attack arrested months ago
  16. WordPress sites stick with vulnerable versions despite worrying rise in attacks
  17. “One click, then boom”: Spear-phishing could “black out” energy companies........
  18. In computers, are random numbers really random?
  19. Java called favorite target for hack attacks this year
  20. Microsoft releases latest Law Enforcement Requests Report - no Skype content...
  21. Hackers target social media, step up mobile attacks
  22. Microsoft’s copyright bots ask Google to hide Microsoft.com links
  23. Copying fingerprints, Firefox trusted, Facebook not, Yahoo recycles - 60 Sec Security
  24. IE zero-day vulnerability exploited more widely than previously thought
  25. Microsoft received 37,000 end-user data requests in first half of year
  26. SIM card hacker: Bug is either 'a backdoor, gross negligence, or both'
  27. Spear-phishing is “super-strain” of bacteria threatening business, investor warns
  28. Walk this way! Forget fingerprints – could our daily habits be the passwords.........
  29. MS Malware Protection Center. Mevade and Sefnit: Stealthy click fraud
  30. French could serve up fines to Google for privacy violation
  31. Evaluating our protection performance and capabilities
  32. For hire: Elite “cyber mercenaries” adept at infecting Windows and Macs
  33. Malicious browser extensions pose a serious threat and defenses are lacking
  34. Thousands of Wordpress blogs compromised to perform DDOS attack
  35. Future cyber attacks could attack medical implants – or wage “psychological war” in v
  36. Rogue iMessage Chat Client Found in Play Store
  37. Microsoft: Security Essentials provides "baseline" protection
  38. End of support for Java SE 6
  39. Win32/Napolar – A new bot on the block
  40. Vanishing rights: stop your online privacy from disappearing
  41. Oracle: We're getting Java security under control
  42. Hacker video shows how to thwart Apple's Touch ID
  43. UK's Get Safe Online? 'No one cares' - run the blockbuster ads instead
  44. Identity theft service planted botnets in LexisNexis, other data providers
  45. Ransomware criminals attack SMEs using strong file encryption, ESET warns
  46. California gives teens an 'eraser button' to hide online skeletons
  47. Yahoo recycled ID users warn of security risk
  48. SkyDrive stumbles, becomes latest cloud app to get glitchy
  49. 'Watering holes' join Java as a major threat to corporate security, says F-Secure
  50. What story do your emails tell about you?
  51. How I hacked SIM cards with a single text - and the networks DON'T CARE
  52. Firefox burns Chrome in our trustworthy browser poll
  53. Internet Explorer Security Flaw Impacting Business Users
  54. Java updates too much of a bother? Maybe online banking's just not for you
  55. New OS X Trojan found and blocked by Apple's XProtect
  56. LinkedIn denies harvesting user email accounts without permission
  57. Banking (Apps) on Google’s Android
  58. Cybercriminals trying new tactics, security body warns ...
  59. Symantec identifes 'Hidden Lynx' as hackers co-op
  60. Can’t keep a bad man down: “Shylock” Trojan returns to attack U.S. banks
  61. Bank robbers pose as IT guys, rig device to slurp £1.3m from Barclays
  62. How Secure Is My Password: The Ultimate Litmus Test
  63. Win Bitcoins, booze and cash! Be the first to crack the iPhone's Touch ID fingerprint
  64. European Commission calls for single privacy law in wake of PRISM snooping
  65. Facebook "Likes" gain constitutional protection for US employees
  66. Patch Monday: A way to avoid more Microsoft Automatic Update fiascos
  67. LinkedIn users sue over service's "hacking" of contacts and spammy ways
  68. How To Make Your Entire Internet Life More Secure In One Day
  69. Defending against web-based malware: Spot the smoke, don't wait for fire
  70. For your security, please email your credit card and driver’s license ...
  71. 'Kissing couple' Trojan sent to slurp fanbois' data...
  72. What Pinterest’s decision to support Do Not Track means for users (and nonusers)
  73. Ahoy, me hearties! Check your almanacks, for today be Talk Like a Pirate Day, arrr!
  74. Microsoft Security Bulletin MS13-023 - Critical
  75. Ransomware Puts Your System To Work Mining Bitcoins
  76. Revoyem Ransomware Sinks to New Low
  77. Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone
  78. Security researchers create undetectable hardware trojans
  79. Surreptitiously Tampering with Computer Chips
  80. Fake card reader “texts” PINs to thieves instantly – and drains bank accounts...
  81. Why You Don’t Need an Outbound Firewall On Your Laptop or Desktop PC
  82. Hacktivism Long passwords are good, but too much length can be a DoS hazard
  83. Meet Hidden Lynx: The most elite hacker crew you’ve never heard of
  84. Security Advisories for Firefox
  85. Microsoft Security Advisory (2887505) Vulnerability in Internet Explorer...
  86. Researchers find new, ultra-low-level method of hacking CPUs...
  87. NIST cybersecurity framework: Your insurance company is watching
  88. NSA snoops on credit card transactions, says report
  89. WHOIS Privacy Plan Draws Fire
  90. Remote Desktop (RDP) Hacking 101: I can see your desktop from here!
  91. How to find out what the data miners know about you
  92. It's about time: Java update includes tool for blocking drive-by exploits
  93. Microsoft's swipe'n'swirl pic passwords LESS secure than PINs, warn researchers
  94. Shame on you! Report shows users lazier than ever about security practices
  95. Tibet-targeting Mac OS malware rears its head again
  96. Microsoft reissues September patches after user complaints
  97. Companies that allow home working “ignore security risks”, report claims
  98. The end? “Passwords are done,” says Google security chief
  99. Dropbox takes a peek at files
  100. Phishing warning after Vodafone hack leaks personal information...
  101. The iPhone 5s fingerprint reader: what you need to know
  102. Firefox Android zero-day allows execution of malicious code
  103. A scam-spotters guide: Ten things your bank will NEVER do – but cybercriminals will
  104. Uncovering an Android botnet involved in SMS fraud
  105. Microsoft confirms stability fixes messed up Outlook 2013
  106. Microsoft botches still more patches in latest Automatic Update
  107. IPhone jailbreakers begin cracking their knuckles over iOS 7
  108. Multiple Oracle and Adobe Product Security Updates are Available – Update Now
  109. Update for Outlook 2013 breaks folder pane
  110. Biz bods STILL don't patch hacker's delight Java and Flash
  111. Microsoft Malicious Software Removal Tool (MSRT) September 2013 - Win32/Simda
  112. Four out of five people are “locked out” of websites due to lost passwords
  113. MaskMe Is Now Your Worldwide Call Blocker: Introducing International Masked Phones
  114. Of course NSA can crack crypto. Anyone can. The question is, how much?
  115. Anatomy of a phish - a "generic mass targeted attack" against WordPress admins
  116. Why should you trust Google, Facebook more than the NSA?
  117. Yahoo: More than 12,000 US data requests led to disclosures more than 11,000 times
  118. Trust no one, advises security expert after NSA revelations
  119. Spooks break most Internet crypto, but how?
  120. Half of Internet users worry over personal info exposed online
  121. Google speeding up end-to-end crypto between data centers worldwide
  122. ‘SBC’ botnet to blame for Tor traffic surge?
  123. Password Generator Magic: Don’t Take On A Difficult Job Alone
  124. Here's how to best secure your data now that the NSA can crack almost any encryption
  125. Microsoft to patch dangerous Outlook hack-by-preview bug next week
  126. Trendnet under fire from FTC over camera security flaws which let hackers spy...
  127. NetTraveler Variant Adds Java Exploits, Watering Hole Attacks to Bag of Tricks
  128. First case of Android Trojan spreading via mobile botnets discovered
  129. Advance Notification Service for September 2013 Security Bulletin Release
  130. “Rogue cellular devices” could allow attackers to block texts, intercept calls...
  131. Faces, gestures, heartbeats - how will the passwords of the future work?
  132. Lawyers report steep rise in employee data theft cases
  133. In a rush? Five two-minute tips to make yourself more secure right now
  134. Improve Your Facebook, Google & LinkedIn Privacy With AVG PrivacyFix
  135. Researchers: Oracle’s Java Security Fails
  136. Syrian Electronic Army Tries to Make Friends with U.S. Marine Corps
  137. Acxiom’s letting you see the data they have about you…kind of
  138. Selecting all PUPs
  139. Hesperbot – A New, Advanced Banking Trojan in the Wild
  140. The perfect security defense is right under our noses
  141. Database of illegal downloaders - are British ISPs to become the "music NSA"?
  142. Facebook spam “earning criminals $200m a year”, researchers claim
  143. The Murky Waters Of The Zero-Day Business
  144. Facebook flaw allowed hackers to delete posted photos
  145. Recipe for disaster? Four in ten “BYOD” owners use no security measures at all
  146. How Often Do You Review Online Privacy Settings?
  147. Even suspicious email is too tempting to skip, survey finds
  148. Encryption: types of secure communication and storage
  149. Dropbox dismisses hack demonstrated by developers
  150. Trojan entices Craigslist users with fake software freebie
  151. Internet dating scam - mother and daughter crime duo jailed
  152. Organisations lack visibility on malware attacks, survey confirms
  153. Big phish, small pond: How to stay safe from SMS phishing scams
  154. Windows 8 picture passwords “can be cracked”, researchers warn
  155. More than 800,000 Facebook users fall victim to password-harvesting browser malware,
  156. IE10 in Windows 8 comes with improved Flash Player Security, says Adobe
  157. Malware to Victims: “Because f*** you! That’s why.”
  158. Bug allows for use of 'sudo' in OS X without a password
  159. Potential dangers for Google Glass, other wearable computers
  160. Java 6 users vulnerable to zero day flaw, security experts warn
  161. 3 types of DNS attacks and how to deal with them
  162. Cisco fixes critical remote command execution vulnerability in Secure Access Control
  163. Tor usage doubles in wake of secure email shutdowns, arrival of PirateBrowser
  164. Developers hack Dropbox and show how to access user data
  165. Schools hire snoopers to monitor kids on social networks. Is it OK?
  166. Unpatched Mac bug gives attackers “super user” status by going back in time
  167. The 4-Step System To Sure-Fire Private Browsing
  168. Online tracking could kill your credit score
  169. Microsoft will craft XP patches after April '14, but not for you
  170. iOS and Android weaknesses allow stealthy pilfering of website credentials
  171. Malicious Chrome extensions on the rise
  172. New York Times, Twitter hacked as domain records altered
  173. Koobface worm-flinging gangster linked to pharma spam ops
  174. Millions of Android users open to attacks due to old versions of OS, FBI warns
  175. Protect Yourself This Semester with Cybersecurity Tips from Malwarebytes
  176. One in five adults have fallen victim to hackers – and one in 50 has lost more ...
  177. Fake Browser Updates Going Rampant
  178. Nymaim – obfuscation chronicles
  179. Download me II—Removing the remnants of the Web’s most dangerous search terms
  180. Which web browser do you trust?
  181. How might the feds have snooped on Lavabit?
  182. You can’t stop the NSA from tracking you, but you can make it harder
  183. Mozilla considers rejecting long-lived digital certificates...
  184. PayPal fixes critical account switcheroo bug after researcher tipoff
  185. How to keep children safe online (without looking over their shoulders all day)
  186. Mozilla 'Plug-n-Hack' project wants browsers to play nice with security software
  187. Five Security Myths Everyone Should Dismiss
  188. Windows 8 users shun Defender in favour of third-party antivirus, figures suggest
  189. Is Windows 8 a Trojan horse for the NSA? The German Government thinks so
  190. Android becomes Windows' equal as a target for hackers
  191. Oh, the Sites You Will Never See
  192. Microsoft needs your help to fix botched patch KB 2859537
  193. Avatar rootkit: the continuing saga
  194. New “anti-phishing” technology uses electronic cards, not passwords
  195. The 4 Keys to Preventing Credit Card Fraud Online
  196. Motorola Skip: Password security without the hassle (key restrictions apply)
  197. Second time's a charm! Microsoft tries again with Active Directory patch
  198. Microsoft predicts bleak future for XP users after patches run out
  199. Android becomes Windows' equal as a target for hackers
  200. The professionalization of malware
  201. No Malware Protection Is Perfect, Including Apple's
  202. LastPass password manager gets security patch against password leakage bug
  203. Microsoft KB2859537 Update Causes BSOD on Windows 7
  204. Cyber criminals add new exploit for recently patched Java vulnerability
  205. Hacker spies on and insults toddler in bed via baby monitor
  206. Hacktivism Once the province of Windows XP, Web servers are hackers’ target of choice
  207. JUST IN: Microsoft pulls more Patch Tuesday updates Topic: Security Discover F
  208. Miss Teen USA 2013 says sextortionist hacked webcam to snap bedroom photos
  209. Blaster from the past: The worm that zapped XP 10 years ago
  210. Buying Battles in the War on Twitter Spam
  211. Catch me if you can: Can we predict who will fall for phishing emails?
  212. Welcome to the “Internet of Things,” where even lights aren’t hacker safe
  213. Microsoft Security Bulletin MS13-066 - Important
  214. Google says Gmail users can't expect privacy
  215. YouTube download plug-ins hijack browsers to deliver malware-laced adverts
  216. eBay troll and fraudster 'Ebayisajoke' staked out and unmasked
  217. Google boosts flaw bounties to $5,000 on Chromium program
  218. Heads up for Patch Tuesday: 24 hours, 8 bulletins, 3 critical,........
  219. How to Let Someone Else Use Your Computer Without Giving Them Access.......
  220. London tosses out Wi-Fi-sniffing 'smart bins'
  221. XP's retirement will be hacker heaven
  222. How to Prevent People From Viewing Your Browser’s Saved Passwords
  223. Password thieves target blogs, content management sites
  224. How Attackers Actually “Hack Accounts” Online and How to Protect Yourself
  225. Warning over security flaws in HP printers which can reveal passwords
  226. Cyber security pros in high demand, highly paid, and highly selective
  227. New security scheme hits text spammers in hours
  228. Security flaw with a difference - the Xerox scanner that makes your house smaller!
  229. Whiter-than-white hats, malware, penalty and repentance*
  230. Microsoft to clean up after Oracle's patch mess again next week
  231. Mozilla bridges Gmail to Persona log-in
  232. Advance Notification Service for August 2013 Security Bulletin Release
  233. Backdoor in popular ad-serving software opens websites to remote hijacking
  234. A Good Example of Why Having Your Browser Save Passwords Might be a Bad Idea
  235. New strain of ransomware evades detection by AV apps
  236. Chrome password security issue stirs debate
  237. Firefox 23 lands with a new logo and mixed content blocking
  238. “Worst of the worst” abuse images may be being used to spread Trojan, charity warns
  239. Windows Phones open to hackers when connecting to rogue Wi-Fi
  240. How do you stop HTTPS-defeating BREACH attacks? Let us count the ways
  241. Windows worm accidentally bundled with KFC Android app
  242. toilet hackers
  243. Researchers Develop DIY System to Detect Malware on Mobile Phones
  244. Email security strongest from social media, report reveals
  245. Firefox Zero-Day Used in Child Porn Hunt?
  246. Microsoft Security Advisory (2876146)
  247. Bulletproof Inbox: Tips for staying safe (and sane) on email
  248. What do a banking Trojan, Chrome, and a government mail server have in common?
  249. Java adverts can be used to create million-strong botnets for just $500
  250. FBI spooks use MALWARE to spy on suspects' Android mobes - report