: Computer Security News


Pages : 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21

  1. Bug allows for use of 'sudo' in OS X without a password
  2. Potential dangers for Google Glass, other wearable computers
  3. Java 6 users vulnerable to zero day flaw, security experts warn
  4. 3 types of DNS attacks and how to deal with them
  5. Cisco fixes critical remote command execution vulnerability in Secure Access Control
  6. Tor usage doubles in wake of secure email shutdowns, arrival of PirateBrowser
  7. Developers hack Dropbox and show how to access user data
  8. Schools hire snoopers to monitor kids on social networks. Is it OK?
  9. Unpatched Mac bug gives attackers “super user” status by going back in time
  10. The 4-Step System To Sure-Fire Private Browsing
  11. Online tracking could kill your credit score
  12. Microsoft will craft XP patches after April '14, but not for you
  13. iOS and Android weaknesses allow stealthy pilfering of website credentials
  14. Malicious Chrome extensions on the rise
  15. New York Times, Twitter hacked as domain records altered
  16. Koobface worm-flinging gangster linked to pharma spam ops
  17. Millions of Android users open to attacks due to old versions of OS, FBI warns
  18. Protect Yourself This Semester with Cybersecurity Tips from Malwarebytes
  19. One in five adults have fallen victim to hackers – and one in 50 has lost more ...
  20. Fake Browser Updates Going Rampant
  21. Nymaim – obfuscation chronicles
  22. Download me II—Removing the remnants of the Web’s most dangerous search terms
  23. Which web browser do you trust?
  24. How might the feds have snooped on Lavabit?
  25. You can’t stop the NSA from tracking you, but you can make it harder
  26. Mozilla considers rejecting long-lived digital certificates...
  27. PayPal fixes critical account switcheroo bug after researcher tipoff
  28. How to keep children safe online (without looking over their shoulders all day)
  29. Mozilla 'Plug-n-Hack' project wants browsers to play nice with security software
  30. Five Security Myths Everyone Should Dismiss
  31. Windows 8 users shun Defender in favour of third-party antivirus, figures suggest
  32. Is Windows 8 a Trojan horse for the NSA? The German Government thinks so
  33. Android becomes Windows' equal as a target for hackers
  34. Oh, the Sites You Will Never See
  35. Microsoft needs your help to fix botched patch KB 2859537
  36. Avatar rootkit: the continuing saga
  37. New “anti-phishing” technology uses electronic cards, not passwords
  38. The 4 Keys to Preventing Credit Card Fraud Online
  39. Motorola Skip: Password security without the hassle (key restrictions apply)
  40. Second time's a charm! Microsoft tries again with Active Directory patch
  41. Microsoft predicts bleak future for XP users after patches run out
  42. Android becomes Windows' equal as a target for hackers
  43. The professionalization of malware
  44. No Malware Protection Is Perfect, Including Apple's
  45. LastPass password manager gets security patch against password leakage bug
  46. Microsoft KB2859537 Update Causes BSOD on Windows 7
  47. Cyber criminals add new exploit for recently patched Java vulnerability
  48. Hacker spies on and insults toddler in bed via baby monitor
  49. Hacktivism Once the province of Windows XP, Web servers are hackers’ target of choice
  50. JUST IN: Microsoft pulls more Patch Tuesday updates Topic: Security Discover F
  51. Miss Teen USA 2013 says sextortionist hacked webcam to snap bedroom photos
  52. Blaster from the past: The worm that zapped XP 10 years ago
  53. Buying Battles in the War on Twitter Spam
  54. Catch me if you can: Can we predict who will fall for phishing emails?
  55. Welcome to the “Internet of Things,” where even lights aren’t hacker safe
  56. Microsoft Security Bulletin MS13-066 - Important
  57. Google says Gmail users can't expect privacy
  58. YouTube download plug-ins hijack browsers to deliver malware-laced adverts
  59. eBay troll and fraudster 'Ebayisajoke' staked out and unmasked
  60. Google boosts flaw bounties to $5,000 on Chromium program
  61. Heads up for Patch Tuesday: 24 hours, 8 bulletins, 3 critical,........
  62. How to Let Someone Else Use Your Computer Without Giving Them Access.......
  63. London tosses out Wi-Fi-sniffing 'smart bins'
  64. XP's retirement will be hacker heaven
  65. How to Prevent People From Viewing Your Browser’s Saved Passwords
  66. Password thieves target blogs, content management sites
  67. How Attackers Actually “Hack Accounts” Online and How to Protect Yourself
  68. Warning over security flaws in HP printers which can reveal passwords
  69. Cyber security pros in high demand, highly paid, and highly selective
  70. New security scheme hits text spammers in hours
  71. Security flaw with a difference - the Xerox scanner that makes your house smaller!
  72. Whiter-than-white hats, malware, penalty and repentance*
  73. Microsoft to clean up after Oracle's patch mess again next week
  74. Mozilla bridges Gmail to Persona log-in
  75. Advance Notification Service for August 2013 Security Bulletin Release
  76. Backdoor in popular ad-serving software opens websites to remote hijacking
  77. A Good Example of Why Having Your Browser Save Passwords Might be a Bad Idea
  78. New strain of ransomware evades detection by AV apps
  79. Chrome password security issue stirs debate
  80. Firefox 23 lands with a new logo and mixed content blocking
  81. “Worst of the worst” abuse images may be being used to spread Trojan, charity warns
  82. Windows Phones open to hackers when connecting to rogue Wi-Fi
  83. How do you stop HTTPS-defeating BREACH attacks? Let us count the ways
  84. Windows worm accidentally bundled with KFC Android app
  85. toilet hackers
  86. Researchers Develop DIY System to Detect Malware on Mobile Phones
  87. Email security strongest from social media, report reveals
  88. Firefox Zero-Day Used in Child Porn Hunt?
  89. Microsoft Security Advisory (2876146)
  90. Bulletproof Inbox: Tips for staying safe (and sane) on email
  91. What do a banking Trojan, Chrome, and a government mail server have in common?
  92. Java adverts can be used to create million-strong botnets for just $500
  93. FBI spooks use MALWARE to spy on suspects' Android mobes - report
  94. Humans still the weakest link as phishing gets smarter and more focused
  95. Wi-Fi routers: More security risks than ever
  96. Sandboxes Explained: How They’re Already Protecting You and How to Sandbox...
  97. Browser privacy tools still lack bite, security analysts say
  98. Crypto experts issue a call to arms to avert the cryptopocalypse
  99. Researchers demo exploits that bypass Windows 8 Secure Boot
  100. Chrome, Firefox users targeted with account-hijacking plugins
  101. Phishing attacks show sudden drop as criminals use servers for DDoS
  102. How a “malicious charger” infects iPhone with spyware in under a minute
  103. 5 tips to save money using online privacy tools
  104. avatar Best Free Antivirus: Windows Defender vs. Avast
  105. Facebook turns on secure browsing by default
  106. Researchers demo new IPv6 attack against Windows 8 PCs
  107. USB flash drives masquerading as keyboards mean more BYOD security headaches
  108. Microsoft’s new programs attract ‘bounty hunters’ who help make safer products
  109. Former Mozilla CEO to head security-software maker AVG
  110. DDoS attack sizes rise above 2Gbps for first time
  111. Should the "Reboot! Shut up and reboot!" theory be applied to programs?
  112. Stanford University hacked, becomes latest data breach victim
  113. Security Vendors: Do No Harm, Heal Thyself
  114. Feds tell Web firms to turn over user account passwords
  115. PayPal opens up bug bounty program to minors
  116. Open-source project Crypton seeks to make encryption easier
  117. Smishing: A Serious Identity Theft Scheme
  118. Android malware samples jump six-fold in Q2
  119. How Protecting Your Privacy Could Make You the Bad Guy
  120. Stop 80 percent of malicious attacks now
  121. The humble SIM card has finally been hacked:
  122. Tired of spam? Hand out a disposable email address
  123. Why You Don’t Need a Full Internet Security Suite
  124. Hack exposes e-mail addresses, password data for 2 million Ubuntu Forum users
  125. Ban passwords, say advocates of alternative authentication
  126. New vulnerability in Java 7 opens door to 10-year-old attack, researchers say
  127. Unusual file-infecting malware steals FTP credentials
  128. Bitcoin Mining by Botnet
  129. Attackers embedding back doors into image files
  130. Styx Crypt Makers Push DDoS, Anti-Antivirus Services
  131. Android malware that gives hackers remote control is on rise
  132. A fresh face for the Microsoft Malware Protection Center
  133. How to tackle JavaScript-based ransomware sites
  134. Family Safety > Help your kids use social websites more safely
  135. Video: Cyber-security and the broken web
  136. Family Safety > 4 Ways to Set Up Parental Controls On Your Home Network
  137. Family Safety > Stand up to online bullying
  138. Shadowlock ransom Trojan demands victims fill in survey for unlock key
  139. Safety & Security Center > Age-based guidelines for kids' Internet use
  140. Best Antivirus
  141. Privacy > Take charge of your online reputation
  142. IT security spend up, but in the wrong places, Oracle says
  143. Teach kids online security basics
  144. Even If You're Wise To Phishing, Spear Phishing Could Still Fool You
  145. Targeted attacks exploit now-patched Windows bug revealed by Google engineer
  146. Another botched Windows patch: MS13-057/KB 2803821/KB 2834904
  147. How Microsoft handed the NSA access to encrypted messages
  148. Microsoft on Wednesday sent its first email congratulations to a bug bounty recipient
  149. WhatsApp users, ignore messages from 'Priyanka' - it's a worm
  150. Are Short Passwords Really That Insecure?
  151. Who’s Behind The Styx-Crypt Exploit Pack?
  152. How elite security ninjas choose and safeguard their passwords
  153. Security updates available for Adobe Flash Player
  154. Microsoft Security Bulletin MS13-056 - Critical
  155. Note to all Internet users: Trust no one
  156. Microsoft Security Bulletin MS13-058 - Important
  157. Microsoft claims 'a few' bug reports in bounty program
  158. Here's what an eavesdropper sees when you use an unsecured Wi-Fi hotspot
  159. Ubisoft warns millions of video gamers of hack attack
  160. Android flaw allows hackers to surreptitiously modify apps
  161. Rampant Apache website attack hits visitors with highly malicious software
  162. Advance Notification Service for July 2103 Security Bulletin Release
  163. Microsoft Security Advisory (2719662)
  164. Spam blizzards used to hide malicious activities
  165. MS Malware Protection Center. Viewing Vobfus infections from above
  166. Revisiting Geolocation Metadata In Our Toys
  167. Anatomy of a browser trick - you've heard of "clickjacking", now meet "keyjacking"...
  168. How to build (and how not to build) a secure “remember me” feature
  169. Two malware programs help each other stay on computers
  170. Why You Can’t Get Infected Just By Opening an Email (and When You Can)
  171. Carberp Code Leak Stokes Copycat Fears
  172. Cisco fixes serious vulnerabilities in email, Web, and content security appliances
  173. Password complexity rules more annoying, less effective than lengthy ones
  174. Google adds (some) malware and phishing info to Transparency Report
  175. A modest proposal for privacy control
  176. One-click/key attack forces IE and Chrome to execute malicious code
  177. Scared of an Online Password Hack? Here’s How to Help Prevent It
  178. Mobile malware grows by 614 percent in last year
  179. New Firefox earns full WebRTC
  180. Vast majority of malware attacks spawned from legit sites
  181. Privacy zealots say, 'Cookies for me, none for thee'
  182. The security futility that is embedding secure login forms within insecure pages
  183. Raspberry Pi bot tracks hacker posts to vacuum up passwords and more
  184. Cookie Clearinghouse pushes 'Do Not Track' another step
  185. Internet Explorer 10 Provides Safer Browsing
  186. Malwarebytes unveils ExplotShield-based Anti-Exploit Beta
  187. Adobe's Creative Cloud Has Already Been Pirated
  188. With bug bounties, Microsoft extends an olive branch to hacker community
  189. Why the 64-bit Version of Windows is More Secure
  190. EU's Cybersecurity Strategy gets harsh criticism from data protection advocate
  191. Abine teams up with privacy companies and Mozilla to take a stand against NSA...
  192. It's over: All private data is public
  193. Windows Security 101: EMET 4.0
  194. Double Cashing With Mobile Banking
  195. Does encryption really shield you from government's prying eyes?
  196. Get ready! Oracle to fix 40 holes in Java on Tuesday, 18 June 2013
  197. MtGox Phishing Campaign Hits Bing, Yahoo!
  198. Microsoft misses Google-found flaw in Patch Tuesday updates
  199. Patch Tuesday: And EVERY version of IE needs fixing AGAIN
  200. Adobe, Microsoft Patch Flash, Windows
  201. Mozilla, EFF, ACLU rally public against electronic surveillance
  202. US upholds the right to search your laptop at the border without warrant
  203. The Value of a Hacked Email Account
  204. Social sites beat retailers, banks for user security and privacy
  205. Behold, the world’s most sophisticated Android trojan
  206. Microsoft works with financial services industry leaders, law enforcement and others
  207. Microsoft Security Bulletin Advance Notification for June 2013
  208. Botnets now routinely using P2P to evade detection...
  209. Windows 8.1 fingerprint reader support includes option to secure ...
  210. Oracle reveals plans for Java security improvements
  211. Koobface back from the dead as pump and dump spam surges
  212. The secret to online safety: Lies, random characters, and a password manager
  213. Australian government announces its National Cloud Computing Strategy
  214. Penetration testing: IT professionals demonstrate how hackers can access webcams
  215. Carna Botnet Analysis Renders Scary Numbers on Vulnerable Devices
  216. Spam catchers catching spammers better
  217. Malware-splosion: 2013 Will be Malware's Biggest Year Ever
  218. Five steps to ultimate Firefox security
  219. Think you have a strong password? Hackers crack 16-character passwords...
  220. Chromium browser gets new reset options for easier recovery from malware
  221. Security is hard, insecurity is easy – demonstrating a simple misconfiguration risk
  222. Network security deteriorating, privacy a lost cause
  223. Google upgrading all SSL certificates to 2048-bit keys by end of 2013
  224. MVPS Host File - May Update
  225. Skype Beta Plugs IP Resolver Privacy Leak
  226. The dangers of downloading software from unofficial sites
  227. 13 steps to turn on Twitter’s 2-step authentication
  228. US urged to permit self-defense retaliation on hackers
  229. Think your Skype messages get end-to-end encryption? Think again
  230. Researchers find critical vulnerabilities in popular game engines
  231. How safe are our routers
  232. The future of passwords: how sharing with your friends can beef up your security....
  233. Congress asks Google if and how it's protecting privacy with Glass
  234. Info-stealing Dorkbot worm spreading on Facebook
  235. One step forward, two steps back.
  236. Mozilla postpones by-default cookie blocking in Firefox
  237. Google security: You (still) are the weakest link
  238. Speed Up PC Performance by Replacing Microsoft's Built-In Antivirus
  239. Microsoft: Invulnerable software is not possible
  240. Internet Explorer 10 blocks more malware than Chrome or Firefox, test finds
  241. Adobe unleases critical patches for ColdFusion, Reader and Flash
  242. Mozilla pushes out new Firefox and Thunderbird: 8 security advisories, 3 critical fix
  243. May Patch Tuesday critical for users of Internet Explorer and web-based services
  244. Microsoft warns of new Trojan hijacking Facebook accounts
  245. Hackers breached Washington state court with Adobe ColdFusion flaw
  246. An unholy alliance - Fake Anti-Virus, meet Bogus Support Call!
  247. Advance Notification Service for the May 2013 Security Bulletin Release
  248. Stealthy malware spreading among popular Web servers
  249. Windows 7 patch KB 2670838 fries Firefox fonts
  250. Microsoft releases fix-it for Internet Explorer 8 vulnerability