: Computer Security News

Pages : 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

  1. Windows Defender's malware protection still leaves much to be desired after...
  2. NSA Doesn’t Need to Spy on Your Calls to Learn Your Secrets
  3. 13-Year-Old Weakness in RC4 Encryption Breaks SSL/TLS
  4. Microsoft at RSA conference USA 2015, April 20-24
  5. Tax Fraud Advice, Straight from the Scammers
  6. Android hijacking bug may allow attackers to install password-stealers
  7. Despite privacy policy, RadioShack customer data up for sale in auction
  8. Adult site Xtube compromised, serving exploits
  9. India strikes down controversial "Section 66A" social media policing law
  10. EU: Don’t use Facebook if you want to keep the NSA away from your data
  11. Where Did VirusBarrier iOS Go?
  12. New malware program PoSeidon targets point-of-sale systems
  13. Week in review: Security risks of networked medical devices, mobile apps...
  14. Scheduled Tasks
  15. Hilton Honors Flaw Exposed All Accounts
  16. Security Think Tank: Enhanced cyber security requires change in attitude
  17. Patched Adobe Flex vulnerability remains threat to web domains
  18. Important Notice About Your Twitch Account
  19. Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware
  20. Want to hide your metadata? You probably can't
  21. Everything is insecure and will be forever says Cisco CTO
  22. Trumping cybercriminals during tax season: Tips on how to stay safe
  23. Yoast Google Analytics Plugin Patches XSS Vulnerability
  24. Signature antivirus' dirty little secret
  25. Home devices threaten enterprise data security, warn researchers
  26. Hacking BIOS Chips Isn’t Just the NSA’s Domain Anymore
  27. Nuclear Exploit Kit Adds Code for Leveraging Newly Patched Flash Player Flaw
  28. Is Yahoo’s On-Demand Password a Bad Move?
  29. Apple: Those security holes we fixed last week? You're going to need to repatch
  30. Fake job seeker's emails deliver ransomware and info-stealer
  31. All four major browsers take a stomping at Pwn2Own hacking competition
  32. Our VPN Service Takes Your Privacy Seriously
  33. A Clever Way to Tell Which of Your Emails Are Being Tracked
  34. China reveals existence of cyber warfare hacking teams
  35. OpenSSL Patch to Plug Severe Security Holes
  36. Watch out for these 9 information security threats
  37. At least 700,000 routers that ISPs gave to their customers are vulnerable to hacking
  38. Security flaw in WordPress plugin Google Analytics by Yoast exposed
  39. Opera acquires VPN firm SurfEasy to boost browsing security
  40. Double FREAK! A cryptographic bug that was found because of the FREAK bug
  41. The NSA Is Going to Love These USB-C Charging Cables
  42. There are known vulnerabilities in Server 2003 that won’t be fixed
  43. The new MacBook's single port comes with a major security risk
  44. The UK’s 10 most infamous data breaches
  45. Experts: Don’t blame the victims of youth ‘selfies’
  46. Premera cyberattack could have exposed information for 11 million customers
  47. Patch Tuesday: Windows 8.1 and VMware VDI Hit with LogonUI Error
  48. Microsoft Blacklists Fake Windows Live SSL Certificate
  49. Scammers Are Using a Fake Version of AdwCleaner to Trick People
  50. Microsoft releases EMET 5.2
  51. Bogus SSL certificate for Windows Live could allow man-in-the-middle hacks
  52. D-Link Patches Two Remotely Exploitable Bugs in Firmware
  53. Exploit kits in 2015: What can we expect?
  54. Apple Pay: Bridging Online and Big Box Fraud
  55. Can the NSA Break Microsoft's BitLocker?
  56. How to tell if you have the latest Java and Adobe versions Adobe
  57. Yahoo puts email encryption plugin source code up for review
  58. Apple Watch worries security advocates
  59. Raising the Stakes: When Software Attacks Hardware
  60. EquationDrug: Sophisticated, stealthy data theft for over a decade
  61. 2,400 unsafe apps on user phones in large firms
  62. A cyber war staged in central London
  63. If you hammer your RAM, won't that break it? 60 Sec Security [VIDEO]
  64. Bypassing ASLR with CVE-2015-0071: An Out-of-Bounds Read Vulnerability
  65. Obama administration seeks more power to tackle botnets
  66. Critical hole in popular WordPress SEO plugin allows SQLi, site hijacking
  67. Tripwire Announces Capture the Flag Cyber Security Competition
  68. Women in Federal cybersecurity – How did they get their start?
  69. New anti-terrorism unit will tackle extremist content on the web
  70. Facebook Worm Lures with Promise of Smut Content, Delivered via Box Cloud Storage
  71. Cyber crooks take advantage of ad bidding networks to deliver ransomware
  72. Hey Siri, How Come Strangers Are Listening To My Private Messages?
  73. The human cost of phone hacking
  74. Cortana and my privacy FAQ
  75. Microsoft Fixes Stuxnet Bug, Again
  76. MS Update 3033929 Causing Reboot Loop
  77. Security updates available for Adobe Flash Player
  78. Defending Against PoS RAM Scrapers
  79. Kaspersky claims to have found NSA's 'space station malware'
  80. UK surveillance 'lacks transparency', ISC report says
  81. Malware “TreasureHunter” innovates by using windows products IDs ...
  82. Part 1: New data on youth “nudes” show disturbing trend
  83. Certificate Reputation for website owners
  84. Twitter Now Tracking User IP Addresses
  85. The next generation of CryptoWall malware emerges
  86. Panda antivirus labels itself as malware, then borks EVERYTHING
  87. Computer-stored encryption keys are not safe from side-channel attacks
  88. Wikimedia v. NSA: Wikimedia Foundation files suit against NSA to challenge ...
  89. Rowhammer Hardware Exploit Poses Threat to DRAM Memory in Many Laptops, PCs
  90. OpenDNS trials system that quickly detects computer crime
  91. Patched Windows PC remained vulnerable to Stuxnet USB exploits since 2010
  92. March 2015 Updates
  93. ID Fraud Totals $16Bn in US for 2014
  94. Email spoofing security hole discovered in Google Admin console
  95. Yet Another Cleaner, Yet Another Stealer
  96. From the Labs: New developments in Microsoft Office malware
  97. Week in review: FREAK flaw, a new PoS malware family, and the new issue of (IN)SECURE
  98. Samba Remote Code Execution Vulnerability – CVE-2015-0240
  99. Adobe invites help with hunting vulnerabilities, but no bounty money
  100. Apple and Google prepare patches for FREAK SSL flaw
  101. We Weren't Surprised CSI:Cyber Gets InfoSec Wrong. Were You?
  102. Fake "Flash Player Pro" update delivers password-stealing Trojan
  103. Litecoin-mining code found in BitTorrent app, freeloaders hit the roof
  104. UK man arrested on suspicion of US Department of Defense hacking
  105. NCC Group to audit OpenSSL for security holes
  106. How to ensure your hot-desking colleagues keep their data secure
  107. Microsoft Security Essentials last in banking trojan detection test
  108. Malware-spreading drive-by attack relies on hacked GoDaddy accounts
  109. Abine launches Bitcoin Anywhere
  110. MRG Effitas releases latest Online Banking Browser Security report
  111. Tracking the FREAK Attack
  112. Security Advisory 3046015 released
  113. Avoid the “March Twitter Lottery”…
  114. Malicious DNS Servers Deliver Fareit
  115. Mandarin Oriental Hotels Hit in Credit Card Breach
  116. Stop the presses: HTTPS-crippling “FREAK” bug affects Windows after all
  117. New PoS malware family discovered
  118. Security threats and the retail industry
  119. Apple and Google prepare patches for FREAK SSL flaw
  120. Ransomware Hits Law Firm, Encrypts Workstation
  121. Mobile Threat Monday: Mysterious Android App Emails Your Location to Creepers
  122. Monitoring tools: user notification required
  123. Survey: Hardly Anybody Uses a Password Manager
  124. Toys “R” Us resets account passwords to counter stolen reward points
  125. Firewall: The king of network security
  126. Hackers impersonating IT staff popular tactic in data breaches, FireEye finds
  127. Insert Product Key: Y / N?
  128. Now you can easily send (free!) encrypted messages between Android, iOS
  129. In major goof, Uber stored sensitive database key on public GitHub page
  130. NSA authority to collect bulk phone data extended to June 1
  131. A Brief History of the Trusted Internet
  132. Bogus Search Engine Leads to Exploits
  133. Which operating system is the most secure? Four points to remember.
  134. The Enemy on your Phone
  135. Apple patent reveals tracking capabilities even if phone appears off
  136. TorrentLocker campaign uses email authentication to tune the operations
  137. Aggressive adware in Google Play apps
  138. WinPatrol v33.1.2015.0 Feb 26th, 2015
  139. 50,000 Uber driver names, license plate numbers exposed in a data breach
  140. Only 11 UK security firms included in global Cybersecurity 500
  141. Tasty Spam: Ebola Scam Infects Inboxes
  142. Email-Based Pharming Attack Exploits Router Flaws
  143. TalkTalk Client Data Stolen, Hackers Use It to Obtain Banking Info
  144. Most vulnerable operating systems and applications in 2014
  145. Lenovo.com hijack reportedly pulled off by hack on upstream registrar
  146. US Spymaster Warns Over Low-level Cyber Attacks
  147. Commercial spyware invades enterprises
  148. UPATRE Trojan Still Top Malware Attached to Spam
  149. Surveillance-based manipulation: How Facebook or Google could tilt elections
  150. Spam Uses Default Passwords to Hack Routers
  151. 62% of the Top 50 Download.com applications bundle toolbars and other PUPs
  152. Bank Regulator Eyes Tougher Rules to Fight Hacking
  153. $3m reward offered for alleged Gameover Zeus kingpin
  154. Security Sense: Superfish and Nasty Root Certs Are Bad, but It’s Worse than That
  155. Webnic Registrar Blamed for Hijack of Lenovo, Google Domains
  156. Ad-blocking software is 'worse than Superfish'
  157. What is malvertising?
  158. As many as 1 million+ WordPress sites imperiled by critical plugin bug
  159. Google is Now Blocking Crapware in Search Results, Ads, and Chrome
  160. Superfish Fallout Raises Privacy Concern Over Parental Control Apps
  161. 10,000 Drivers In Parking Ticket Data Breach
  162. Microsoft Tries to Recover After Superfish Fiasco, Offers Clean PCs Without Junkware
  163. Windows Is No Longer the Most Vulnerable Operating System in the World
  164. Old Vulnerabilities Still Popular Targets for Hackers: HP
  165. Mobile Threat Monday: Telegram Has Unencrypted Copies of Secret Chat Messages
  166. TurboTax’s Anti-Fraud Efforts Under Scrutiny
  167. How cybercriminals hack our brains
  168. What's SUPER and helps you to PHISH, sorry, FISH? 60 Sec Security [VIDEO]
  169. Masque Attack II Targets iPhone Users Via App Store
  170. Google's cloud will now scan web apps for common security flaws
  171. Lenovo slapped with lawsuit over dangerous Superfish adware
  172. Snowden documentary, Citizenfour, wins Oscar
  173. Exploitation By Consent
  174. Lenovo Preinstalled Superfish Adware on Laptops – REACTIONS
  175. Quick! File your taxes before a hacker does it for you
  176. Lenovo apologizes over pre-installed tracking software
  177. The Great SIM Heist How Spies Stole the Keys to the Encryption Castle
  178. Norton Internet Security antivirus update 'borked Internet Explorer'
  179. Lenovo and Superfish? Don’t panic, you may not be affected
  180. Say What? Required contents of notice in data breach notifications
  181. Windows Defender now removes Superfish malware… if you’re lucky
  182. Microsoft, LastPass and others post solutions to handle Superfish
  183. ‘Yes, Your Car Wash Is On Facebook’
  184. US cyber-cops declare WAR on Superfish ad-spewing malware lurking in Lenovo laptops
  185. Spies Can Track You Just by Watching Your Phone’s Power Use
  186. Born in the NSA - spook spin-out Sqrrl now offers 'out of the box' security
  187. DDoS-for-Hire Services Cheap But Effective
  188. Massive SIM card encryption key hack gives US, UK spies access to billions of phones
  189. Check Point Acquires Stealth-mode Security Startup
  190. Feb18 Protecting Your Money: How Does PoS Malware Get In?
  191. Hacker puts words into wrestler’s mouth in WWE Twitter hack
  192. Major Adult Website Gets Hacked, Malicious Iframe Leads to Angler EK
  193. AOL Search Vulnerable to Reflected File Download Attacks
  194. How a 7-year-old girl hacked a public Wi-Fi network in 10 minutes
  195. HTTP 2.0 wins approval: Road to better encryption?
  196. Lenovo Superfish
  197. Microsoft's cybercrime fighting unit opens up fifth satellite center in Singapore
  198. Israel targeted by malware packaged with pornographic video
  199. Banking Malware VAWTRAK Now Uses Malicious Macros, Abuses Windows PowerShell
  200. Chips under the skin: Biohacking, the connected body is 'here to stay'
  201. Microsoft replaces patch that killed PowerPoint
  202. Windows 10 will let you say goodbye to passwords forever
  203. Square Enix Phishers Home In on Dragon Quest X Video Gamers
  204. How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last
  205. 10 tips to maintain an online presence in a privacy-hostile world
  206. Information disclosure flaw exposes Netgear wireless routers to attacks
  207. Hardening Firefox
  208. NSA malware found hiding in hard drives for almost 20 years
  209. Windows 10 Activation Programs: PUPs and Surveys
  210. Today, Microsoft was a participant at the United States White House Cybersecurity and
  211. Google Adds Grace Period to Disclosure Policy
  212. What do you mean, "Facebook is now text only"? - 60 Sec Security [VIDEO]
  213. BYOD: Better stay used to it
  214. Lack of CSPRNG Threatens WordPress Sites
  215. A Crypto Trick That Makes Software Nearly Impossible to Reverse-Engineer
  216. Week in review: Car hacking and hijacking, critical Windows flaws, and Forbes.com com
  217. How data privacy is turning into an Orwellian maze
  218. 16 million mobile devices infected by malware
  219. Microsoft, Google join forces to tackle antivirus false flags
  220. Report: Millions stolen from banks through sophisticated malware
  221. Patch Tuesday: KB3023607 Breaks Cisco AnyConnect, Here's a Fix
  222. Robot tweets "I seriously want to kill people", prompts police response
  223. Amazon “Notice: Ticket Number” Phish Seeks Card Details
  224. Reactions to White House Cybersecurity Information Sharing Initiative
  225. Patch Tuesday: Microsoft Removes KB2920732 that Breaks PowerPoint
  226. Fuel Station Skimmers: Primed at the Pump
  227. Privacy News of the Week. Verizon Wireless to allow ‘supercookie’ opt-out
  228. Connected homes can be easy targets for hackers, says cybersecurity firm
  229. Sexy Russian scammers would love to break your heart this Valentine’s Day
  230. Never mind, Samsung, GOOGLE will EAVESDROP as you browse on Chrome
  231. Minded Security launches 'agentless' bank security tool in UK
  232. Vulnerability Research and Disclosure: Evolving To Meet Targeted Attacks
  233. An unromantic truth: Survey shows people are hesitant to share their online passwords
  234. 'Revenge porn' to be made illegal in England and Wales
  235. Antivirus tools miss almost 70 percent of malware within the first hour
  236. Facebook bug could have DELETED EVERY SINGLE PHOTO
  237. PayPal Phishing Sophistication Growing
  238. Pwned in 7 seconds: Hackers use Flash and IE to target Forbes visitors
  239. February 2015 Office Update Release
  240. KRBTGT Account Password Reset Scripts now available for customers
  241. Scammers Are Using a Fake Version of AdwCleaner to Trick People
  242. Creaking Patch Tuesday’s Viability Rests with Quality, Speed
  243. Researchers bypass Windows security by changing 1 bit
  244. New agency to sniff out threats in cyberspace
  245. Connected Home Security Systems Easy to Hack: HP
  246. Ransomware authors streamline attacks, infections rise
  247. Safer Internet Day 2015: This year, “Do 1 (More) Thing” to stay safer online
  248. Monster IE Update Top Patch Tuesday Priority
  249. Forbes.com infected by hackers in campaign to spy on visitors-researchers
  250. Was SSL3 killed by a POODLE? Surveys says…Maybe!