: Computer Security News


Pages : 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32

  1. The next generation of CryptoWall malware emerges
  2. Panda antivirus labels itself as malware, then borks EVERYTHING
  3. Computer-stored encryption keys are not safe from side-channel attacks
  4. Wikimedia v. NSA: Wikimedia Foundation files suit against NSA to challenge ...
  5. Rowhammer Hardware Exploit Poses Threat to DRAM Memory in Many Laptops, PCs
  6. OpenDNS trials system that quickly detects computer crime
  7. Patched Windows PC remained vulnerable to Stuxnet USB exploits since 2010
  8. March 2015 Updates
  9. ID Fraud Totals $16Bn in US for 2014
  10. Email spoofing security hole discovered in Google Admin console
  11. Yet Another Cleaner, Yet Another Stealer
  12. From the Labs: New developments in Microsoft Office malware
  13. Week in review: FREAK flaw, a new PoS malware family, and the new issue of (IN)SECURE
  14. Samba Remote Code Execution Vulnerability – CVE-2015-0240
  15. Adobe invites help with hunting vulnerabilities, but no bounty money
  16. Apple and Google prepare patches for FREAK SSL flaw
  17. We Weren't Surprised CSI:Cyber Gets InfoSec Wrong. Were You?
  18. Fake "Flash Player Pro" update delivers password-stealing Trojan
  19. Litecoin-mining code found in BitTorrent app, freeloaders hit the roof
  20. UK man arrested on suspicion of US Department of Defense hacking
  21. NCC Group to audit OpenSSL for security holes
  22. How to ensure your hot-desking colleagues keep their data secure
  23. Microsoft Security Essentials last in banking trojan detection test
  24. Malware-spreading drive-by attack relies on hacked GoDaddy accounts
  25. Abine launches Bitcoin Anywhere
  26. MRG Effitas releases latest Online Banking Browser Security report
  27. Tracking the FREAK Attack
  28. Security Advisory 3046015 released
  29. Avoid the “March Twitter Lottery”…
  30. Malicious DNS Servers Deliver Fareit
  31. Mandarin Oriental Hotels Hit in Credit Card Breach
  32. Stop the presses: HTTPS-crippling “FREAK” bug affects Windows after all
  33. New PoS malware family discovered
  34. Security threats and the retail industry
  35. Apple and Google prepare patches for FREAK SSL flaw
  36. Ransomware Hits Law Firm, Encrypts Workstation
  37. Mobile Threat Monday: Mysterious Android App Emails Your Location to Creepers
  38. Monitoring tools: user notification required
  39. Survey: Hardly Anybody Uses a Password Manager
  40. Toys “R” Us resets account passwords to counter stolen reward points
  41. Firewall: The king of network security
  42. Hackers impersonating IT staff popular tactic in data breaches, FireEye finds
  43. Insert Product Key: Y / N?
  44. Now you can easily send (free!) encrypted messages between Android, iOS
  45. In major goof, Uber stored sensitive database key on public GitHub page
  46. NSA authority to collect bulk phone data extended to June 1
  47. A Brief History of the Trusted Internet
  48. Bogus Search Engine Leads to Exploits
  49. Which operating system is the most secure? Four points to remember.
  50. The Enemy on your Phone
  51. Apple patent reveals tracking capabilities even if phone appears off
  52. TorrentLocker campaign uses email authentication to tune the operations
  53. Aggressive adware in Google Play apps
  54. WinPatrol v33.1.2015.0 Feb 26th, 2015
  55. 50,000 Uber driver names, license plate numbers exposed in a data breach
  56. Only 11 UK security firms included in global Cybersecurity 500
  57. Tasty Spam: Ebola Scam Infects Inboxes
  58. Email-Based Pharming Attack Exploits Router Flaws
  59. TalkTalk Client Data Stolen, Hackers Use It to Obtain Banking Info
  60. Most vulnerable operating systems and applications in 2014
  61. Lenovo.com hijack reportedly pulled off by hack on upstream registrar
  62. US Spymaster Warns Over Low-level Cyber Attacks
  63. Commercial spyware invades enterprises
  64. UPATRE Trojan Still Top Malware Attached to Spam
  65. Surveillance-based manipulation: How Facebook or Google could tilt elections
  66. Spam Uses Default Passwords to Hack Routers
  67. 62% of the Top 50 Download.com applications bundle toolbars and other PUPs
  68. Bank Regulator Eyes Tougher Rules to Fight Hacking
  69. $3m reward offered for alleged Gameover Zeus kingpin
  70. Security Sense: Superfish and Nasty Root Certs Are Bad, but It’s Worse than That
  71. Webnic Registrar Blamed for Hijack of Lenovo, Google Domains
  72. Ad-blocking software is 'worse than Superfish'
  73. What is malvertising?
  74. As many as 1 million+ WordPress sites imperiled by critical plugin bug
  75. Google is Now Blocking Crapware in Search Results, Ads, and Chrome
  76. Superfish Fallout Raises Privacy Concern Over Parental Control Apps
  77. 10,000 Drivers In Parking Ticket Data Breach
  78. Microsoft Tries to Recover After Superfish Fiasco, Offers Clean PCs Without Junkware
  79. Windows Is No Longer the Most Vulnerable Operating System in the World
  80. Old Vulnerabilities Still Popular Targets for Hackers: HP
  81. Mobile Threat Monday: Telegram Has Unencrypted Copies of Secret Chat Messages
  82. TurboTax’s Anti-Fraud Efforts Under Scrutiny
  83. How cybercriminals hack our brains
  84. What's SUPER and helps you to PHISH, sorry, FISH? 60 Sec Security [VIDEO]
  85. Masque Attack II Targets iPhone Users Via App Store
  86. Google's cloud will now scan web apps for common security flaws
  87. Lenovo slapped with lawsuit over dangerous Superfish adware
  88. Snowden documentary, Citizenfour, wins Oscar
  89. Exploitation By Consent
  90. Lenovo Preinstalled Superfish Adware on Laptops – REACTIONS
  91. Quick! File your taxes before a hacker does it for you
  92. Lenovo apologizes over pre-installed tracking software
  93. The Great SIM Heist How Spies Stole the Keys to the Encryption Castle
  94. Norton Internet Security antivirus update 'borked Internet Explorer'
  95. Lenovo and Superfish? Don’t panic, you may not be affected
  96. Say What? Required contents of notice in data breach notifications
  97. Windows Defender now removes Superfish malware… if you’re lucky
  98. Microsoft, LastPass and others post solutions to handle Superfish
  99. ‘Yes, Your Car Wash Is On Facebook’
  100. US cyber-cops declare WAR on Superfish ad-spewing malware lurking in Lenovo laptops
  101. Spies Can Track You Just by Watching Your Phone’s Power Use
  102. Born in the NSA - spook spin-out Sqrrl now offers 'out of the box' security
  103. DDoS-for-Hire Services Cheap But Effective
  104. Massive SIM card encryption key hack gives US, UK spies access to billions of phones
  105. Check Point Acquires Stealth-mode Security Startup
  106. Feb18 Protecting Your Money: How Does PoS Malware Get In?
  107. Hacker puts words into wrestler’s mouth in WWE Twitter hack
  108. Major Adult Website Gets Hacked, Malicious Iframe Leads to Angler EK
  109. AOL Search Vulnerable to Reflected File Download Attacks
  110. How a 7-year-old girl hacked a public Wi-Fi network in 10 minutes
  111. HTTP 2.0 wins approval: Road to better encryption?
  112. Lenovo Superfish
  113. Microsoft's cybercrime fighting unit opens up fifth satellite center in Singapore
  114. Israel targeted by malware packaged with pornographic video
  115. Banking Malware VAWTRAK Now Uses Malicious Macros, Abuses Windows PowerShell
  116. Chips under the skin: Biohacking, the connected body is 'here to stay'
  117. Microsoft replaces patch that killed PowerPoint
  118. Windows 10 will let you say goodbye to passwords forever
  119. Square Enix Phishers Home In on Dragon Quest X Video Gamers
  120. How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last
  121. 10 tips to maintain an online presence in a privacy-hostile world
  122. Information disclosure flaw exposes Netgear wireless routers to attacks
  123. Hardening Firefox
  124. NSA malware found hiding in hard drives for almost 20 years
  125. Windows 10 Activation Programs: PUPs and Surveys
  126. Today, Microsoft was a participant at the United States White House Cybersecurity and
  127. Google Adds Grace Period to Disclosure Policy
  128. What do you mean, "Facebook is now text only"? - 60 Sec Security [VIDEO]
  129. BYOD: Better stay used to it
  130. Lack of CSPRNG Threatens WordPress Sites
  131. A Crypto Trick That Makes Software Nearly Impossible to Reverse-Engineer
  132. Week in review: Car hacking and hijacking, critical Windows flaws, and Forbes.com com
  133. How data privacy is turning into an Orwellian maze
  134. 16 million mobile devices infected by malware
  135. Microsoft, Google join forces to tackle antivirus false flags
  136. Report: Millions stolen from banks through sophisticated malware
  137. Patch Tuesday: KB3023607 Breaks Cisco AnyConnect, Here's a Fix
  138. Robot tweets "I seriously want to kill people", prompts police response
  139. Amazon “Notice: Ticket Number” Phish Seeks Card Details
  140. Reactions to White House Cybersecurity Information Sharing Initiative
  141. Patch Tuesday: Microsoft Removes KB2920732 that Breaks PowerPoint
  142. Fuel Station Skimmers: Primed at the Pump
  143. Privacy News of the Week. Verizon Wireless to allow ‘supercookie’ opt-out
  144. Connected homes can be easy targets for hackers, says cybersecurity firm
  145. Sexy Russian scammers would love to break your heart this Valentine’s Day
  146. Never mind, Samsung, GOOGLE will EAVESDROP as you browse on Chrome
  147. Minded Security launches 'agentless' bank security tool in UK
  148. Vulnerability Research and Disclosure: Evolving To Meet Targeted Attacks
  149. An unromantic truth: Survey shows people are hesitant to share their online passwords
  150. 'Revenge porn' to be made illegal in England and Wales
  151. Antivirus tools miss almost 70 percent of malware within the first hour
  152. Facebook bug could have DELETED EVERY SINGLE PHOTO
  153. PayPal Phishing Sophistication Growing
  154. Pwned in 7 seconds: Hackers use Flash and IE to target Forbes visitors
  155. February 2015 Office Update Release
  156. KRBTGT Account Password Reset Scripts now available for customers
  157. Scammers Are Using a Fake Version of AdwCleaner to Trick People
  158. Creaking Patch Tuesday’s Viability Rests with Quality, Speed
  159. Researchers bypass Windows security by changing 1 bit
  160. New agency to sniff out threats in cyberspace
  161. Connected Home Security Systems Easy to Hack: HP
  162. Ransomware authors streamline attacks, infections rise
  163. Safer Internet Day 2015: This year, “Do 1 (More) Thing” to stay safer online
  164. Monster IE Update Top Patch Tuesday Priority
  165. Forbes.com infected by hackers in campaign to spy on visitors-researchers
  166. Was SSL3 killed by a POODLE? Surveys says…Maybe!
  167. UK lags US in cyber insurance, study shows
  168. Fearing an FBI raid, researcher publishes 10 million passwords/usernames
  169. Microsoft Security Bulletin Summary for February 2015
  170. Your Samsung SmartTV Is Spying on You, Basically
  171. New spyware steals pictures and data from iOS devices
  172. New DYRE banking malware in the wild
  173. New Adware Found In Google Play Apps With Millions Of Downloads
  174. Detecting zero-day hack in one millisecond with 'power fingerprinting'
  175. Ransomware 2.0 'crypts website databases – until victims pay up
  176. Malicious ads on major sites compromise many computers
  177. Phishers, scammers pile into worried Anthem customers in FRAUD FRENZY
  178. How Tor Was Broken Into (And Why That Doesn't Matter)
  179. DDoS malware for Linux systems comes with sophisticated custom-built rootkit
  180. Get the Drop on…Dead Drops
  181. IE11 zero-day vulnerability hits Windows 7 and 8.1 users
  182. The Facts about Botnets
  183. More iCloud phishing: don't get sucked in
  184. Once-starving GnuPG crypto project gets a windfall. Now comes the hard part
  185. Panda Security restructures for growth
  186. Facebook's DeepFace facial recognition technology has human-like accuracy
  187. Gamers, beware of fake in-game communication apps
  188. BEDEP Malware Tied To Adobe Zero-Days
  189. UK cyber attacker faces jail for targeting public services sites
  190. GCHQ-NSA intelligence sharing unlawful
  191. ISIS Bans Apple iPhones, iPads, iPods In The Caliphate Due To Fears They're Being ...
  192. IT professional, hack thyself
  193. Universal XSS flaw in fully patched Microsoft Internet Explorer exposed
  194. Flash Player 16.0.0.305 Patches Zero-Day Vulnerability
  195. WebRTC in Firefox and Chrome Reveals IPs Behind VPN
  196. As Flash 0day exploits reach new level of meanness, what are users to do?
  197. Google redesigns security warnings after 70% of Chrome users ignore them
  198. Regin malware and NSA’s QWERTY tool exposed as part of the same platform
  199. Google announces ‘Vulnerability Research Grants’
  200. "Exploit This": Evaluating the exploit skills of malware groups
  201. Android Banking Trojan Is Controlled via SMS
  202. DNS Hijack in D-Link Routers, No Authentication Required
  203. Warning -- Microsoft's new iOS Outlook app is insecure
  204. Skype Chats Compromised Syrian Rebels: Researchers
  205. Cyber crime is a threat to global economy, says researcher
  206. Email scammers stole $215M from businesses in 14 months
  207. The GHOST in the machine - 60 Sec Security [VIDEO]
  208. DDoS attacks almost doubled in year: Akamai State of the Internet Security Report
  209. Hackers Compromise Business IM Service HipChat
  210. Safe Practices with Your Mobile Device
  211. New Variant of Dyre Trojan Spreads Upatre Malware via Microsoft Outlook
  212. (New) Security Advisory for Adobe Flash Player
  213. Future airports could become hi-tech pleasure domes
  214. Exploring Control Flow Guard in Windows 10
  215. Dating site Topface pays hacker who stole 20 million credentials
  216. Threatpost News Wrap, January 30, 2015
  217. US military explores ‘cognitive fingerprints’ as alternative to passwords
  218. Google to change UK privacy policy after regulatory pressure
  219. Facebook Malware Poses as Flash Update, Infects 110K Users
  220. Critical Ghost bug could haunt WordPress and PHP apps, too
  221. Jihadists Increasingly Wary of Internet, Experts Say
  222. The Internet of Dangerous Things
  223. Only fall of global firm will shake up cyber security
  224. WhatsApp Web has privacy holes that could expose user photos
  225. World’s most ‘NSA-proof’ phone vulnerable to simple SMS hack
  226. Who runs an anti-virus scan these days? Apparently almost nobody
  227. Google defends policy that leaves most Android devices unpatched
  228. Security of Home Surveillance Cameras
  229. Verizon Wireless placing ‘supercookies’ on customer devices
  230. Exploit Kits: A Fast Growing Threat
  231. AV-Comparatives Names Product of the Year for 2014
  232. Security Experts Unite to Rewrite Proposed Cyber Laws
  233. Low Hanging Fruit: Flash Player
  234. Bug in ultra secure BlackPhone let attackers decrypt texts, stalk users
  235. Flurry of cyberattacks causes concern for Davos elites at World Economic Forum
  236. QinetiQ hosts latest Cyber Security Challenge competition
  237. Maldrone: Malware which hijacks your personal drone
  238. Wireless device in two million cars wide open to hacking
  239. GHOST, a critical Linux security hole, is revealed
  240. The tooth gnashing you hear is from Flash users installing a new 0day patch
  241. Spreading the Disease and Selling the Cure
  242. Lizard Squad claims to have brought down both Facebook and Instagram
  243. Has The Antivirus Industry Gone Mad?!
  244. Microsoft Security Advisory 2755801
  245. Russian Dating Site Topface Hacked for 20 Million User Names
  246. SCADA programmers? It's time for security by default! 60 Sec Security [VIDEO]
  247. Malaysia Airlines website 'compromised' by hackers
  248. Davos Elites Warned About Catastrophic Cyberattacks
  249. Predictions for 2015
  250. Snowden, NSA face off over privacy at Harvard