: Computer Security News

Pages : 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21

  1. Is Windows 8 a Trojan horse for the NSA? The German Government thinks so
  2. Android becomes Windows' equal as a target for hackers
  3. Oh, the Sites You Will Never See
  4. Microsoft needs your help to fix botched patch KB 2859537
  5. Avatar rootkit: the continuing saga
  6. New “anti-phishing” technology uses electronic cards, not passwords
  7. The 4 Keys to Preventing Credit Card Fraud Online
  8. Motorola Skip: Password security without the hassle (key restrictions apply)
  9. Second time's a charm! Microsoft tries again with Active Directory patch
  10. Microsoft predicts bleak future for XP users after patches run out
  11. Android becomes Windows' equal as a target for hackers
  12. The professionalization of malware
  13. No Malware Protection Is Perfect, Including Apple's
  14. LastPass password manager gets security patch against password leakage bug
  15. Microsoft KB2859537 Update Causes BSOD on Windows 7
  16. Cyber criminals add new exploit for recently patched Java vulnerability
  17. Hacker spies on and insults toddler in bed via baby monitor
  18. Hacktivism Once the province of Windows XP, Web servers are hackers’ target of choice
  19. JUST IN: Microsoft pulls more Patch Tuesday updates Topic: Security Discover F
  20. Miss Teen USA 2013 says sextortionist hacked webcam to snap bedroom photos
  21. Blaster from the past: The worm that zapped XP 10 years ago
  22. Buying Battles in the War on Twitter Spam
  23. Catch me if you can: Can we predict who will fall for phishing emails?
  24. Welcome to the “Internet of Things,” where even lights aren’t hacker safe
  25. Microsoft Security Bulletin MS13-066 - Important
  26. Google says Gmail users can't expect privacy
  27. YouTube download plug-ins hijack browsers to deliver malware-laced adverts
  28. eBay troll and fraudster 'Ebayisajoke' staked out and unmasked
  29. Google boosts flaw bounties to $5,000 on Chromium program
  30. Heads up for Patch Tuesday: 24 hours, 8 bulletins, 3 critical,........
  31. How to Let Someone Else Use Your Computer Without Giving Them Access.......
  32. London tosses out Wi-Fi-sniffing 'smart bins'
  33. XP's retirement will be hacker heaven
  34. How to Prevent People From Viewing Your Browser’s Saved Passwords
  35. Password thieves target blogs, content management sites
  36. How Attackers Actually “Hack Accounts” Online and How to Protect Yourself
  37. Warning over security flaws in HP printers which can reveal passwords
  38. Cyber security pros in high demand, highly paid, and highly selective
  39. New security scheme hits text spammers in hours
  40. Security flaw with a difference - the Xerox scanner that makes your house smaller!
  41. Whiter-than-white hats, malware, penalty and repentance*
  42. Microsoft to clean up after Oracle's patch mess again next week
  43. Mozilla bridges Gmail to Persona log-in
  44. Advance Notification Service for August 2013 Security Bulletin Release
  45. Backdoor in popular ad-serving software opens websites to remote hijacking
  46. A Good Example of Why Having Your Browser Save Passwords Might be a Bad Idea
  47. New strain of ransomware evades detection by AV apps
  48. Chrome password security issue stirs debate
  49. Firefox 23 lands with a new logo and mixed content blocking
  50. “Worst of the worst” abuse images may be being used to spread Trojan, charity warns
  51. Windows Phones open to hackers when connecting to rogue Wi-Fi
  52. How do you stop HTTPS-defeating BREACH attacks? Let us count the ways
  53. Windows worm accidentally bundled with KFC Android app
  54. toilet hackers
  55. Researchers Develop DIY System to Detect Malware on Mobile Phones
  56. Email security strongest from social media, report reveals
  57. Firefox Zero-Day Used in Child Porn Hunt?
  58. Microsoft Security Advisory (2876146)
  59. Bulletproof Inbox: Tips for staying safe (and sane) on email
  60. What do a banking Trojan, Chrome, and a government mail server have in common?
  61. Java adverts can be used to create million-strong botnets for just $500
  62. FBI spooks use MALWARE to spy on suspects' Android mobes - report
  63. Humans still the weakest link as phishing gets smarter and more focused
  64. Wi-Fi routers: More security risks than ever
  65. Sandboxes Explained: How They’re Already Protecting You and How to Sandbox...
  66. Browser privacy tools still lack bite, security analysts say
  67. Crypto experts issue a call to arms to avert the cryptopocalypse
  68. Researchers demo exploits that bypass Windows 8 Secure Boot
  69. Chrome, Firefox users targeted with account-hijacking plugins
  70. Phishing attacks show sudden drop as criminals use servers for DDoS
  71. How a “malicious charger” infects iPhone with spyware in under a minute
  72. 5 tips to save money using online privacy tools
  73. avatar Best Free Antivirus: Windows Defender vs. Avast
  74. Facebook turns on secure browsing by default
  75. Researchers demo new IPv6 attack against Windows 8 PCs
  76. USB flash drives masquerading as keyboards mean more BYOD security headaches
  77. Microsoft’s new programs attract ‘bounty hunters’ who help make safer products
  78. Former Mozilla CEO to head security-software maker AVG
  79. DDoS attack sizes rise above 2Gbps for first time
  80. Should the "Reboot! Shut up and reboot!" theory be applied to programs?
  81. Stanford University hacked, becomes latest data breach victim
  82. Security Vendors: Do No Harm, Heal Thyself
  83. Feds tell Web firms to turn over user account passwords
  84. PayPal opens up bug bounty program to minors
  85. Open-source project Crypton seeks to make encryption easier
  86. Smishing: A Serious Identity Theft Scheme
  87. Android malware samples jump six-fold in Q2
  88. How Protecting Your Privacy Could Make You the Bad Guy
  89. Stop 80 percent of malicious attacks now
  90. The humble SIM card has finally been hacked:
  91. Tired of spam? Hand out a disposable email address
  92. Why You Don’t Need a Full Internet Security Suite
  93. Hack exposes e-mail addresses, password data for 2 million Ubuntu Forum users
  94. Ban passwords, say advocates of alternative authentication
  95. New vulnerability in Java 7 opens door to 10-year-old attack, researchers say
  96. Unusual file-infecting malware steals FTP credentials
  97. Bitcoin Mining by Botnet
  98. Attackers embedding back doors into image files
  99. Styx Crypt Makers Push DDoS, Anti-Antivirus Services
  100. Android malware that gives hackers remote control is on rise
  101. A fresh face for the Microsoft Malware Protection Center
  102. How to tackle JavaScript-based ransomware sites
  103. Family Safety > Help your kids use social websites more safely
  104. Video: Cyber-security and the broken web
  105. Family Safety > 4 Ways to Set Up Parental Controls On Your Home Network
  106. Family Safety > Stand up to online bullying
  107. Shadowlock ransom Trojan demands victims fill in survey for unlock key
  108. Safety & Security Center > Age-based guidelines for kids' Internet use
  109. Best Antivirus
  110. Privacy > Take charge of your online reputation
  111. IT security spend up, but in the wrong places, Oracle says
  112. Teach kids online security basics
  113. Even If You're Wise To Phishing, Spear Phishing Could Still Fool You
  114. Targeted attacks exploit now-patched Windows bug revealed by Google engineer
  115. Another botched Windows patch: MS13-057/KB 2803821/KB 2834904
  116. How Microsoft handed the NSA access to encrypted messages
  117. Microsoft on Wednesday sent its first email congratulations to a bug bounty recipient
  118. WhatsApp users, ignore messages from 'Priyanka' - it's a worm
  119. Are Short Passwords Really That Insecure?
  120. Who’s Behind The Styx-Crypt Exploit Pack?
  121. How elite security ninjas choose and safeguard their passwords
  122. Security updates available for Adobe Flash Player
  123. Microsoft Security Bulletin MS13-056 - Critical
  124. Note to all Internet users: Trust no one
  125. Microsoft Security Bulletin MS13-058 - Important
  126. Microsoft claims 'a few' bug reports in bounty program
  127. Here's what an eavesdropper sees when you use an unsecured Wi-Fi hotspot
  128. Ubisoft warns millions of video gamers of hack attack
  129. Android flaw allows hackers to surreptitiously modify apps
  130. Rampant Apache website attack hits visitors with highly malicious software
  131. Advance Notification Service for July 2103 Security Bulletin Release
  132. Microsoft Security Advisory (2719662)
  133. Spam blizzards used to hide malicious activities
  134. MS Malware Protection Center. Viewing Vobfus infections from above
  135. Revisiting Geolocation Metadata In Our Toys
  136. Anatomy of a browser trick - you've heard of "clickjacking", now meet "keyjacking"...
  137. How to build (and how not to build) a secure “remember me” feature
  138. Two malware programs help each other stay on computers
  139. Why You Can’t Get Infected Just By Opening an Email (and When You Can)
  140. Carberp Code Leak Stokes Copycat Fears
  141. Cisco fixes serious vulnerabilities in email, Web, and content security appliances
  142. Password complexity rules more annoying, less effective than lengthy ones
  143. Google adds (some) malware and phishing info to Transparency Report
  144. A modest proposal for privacy control
  145. One-click/key attack forces IE and Chrome to execute malicious code
  146. Scared of an Online Password Hack? Here’s How to Help Prevent It
  147. Mobile malware grows by 614 percent in last year
  148. New Firefox earns full WebRTC
  149. Vast majority of malware attacks spawned from legit sites
  150. Privacy zealots say, 'Cookies for me, none for thee'
  151. The security futility that is embedding secure login forms within insecure pages
  152. Raspberry Pi bot tracks hacker posts to vacuum up passwords and more
  153. Cookie Clearinghouse pushes 'Do Not Track' another step
  154. Internet Explorer 10 Provides Safer Browsing
  155. Malwarebytes unveils ExplotShield-based Anti-Exploit Beta
  156. Adobe's Creative Cloud Has Already Been Pirated
  157. With bug bounties, Microsoft extends an olive branch to hacker community
  158. Why the 64-bit Version of Windows is More Secure
  159. EU's Cybersecurity Strategy gets harsh criticism from data protection advocate
  160. Abine teams up with privacy companies and Mozilla to take a stand against NSA...
  161. It's over: All private data is public
  162. Windows Security 101: EMET 4.0
  163. Double Cashing With Mobile Banking
  164. Does encryption really shield you from government's prying eyes?
  165. Get ready! Oracle to fix 40 holes in Java on Tuesday, 18 June 2013
  166. MtGox Phishing Campaign Hits Bing, Yahoo!
  167. Microsoft misses Google-found flaw in Patch Tuesday updates
  168. Patch Tuesday: And EVERY version of IE needs fixing AGAIN
  169. Adobe, Microsoft Patch Flash, Windows
  170. Mozilla, EFF, ACLU rally public against electronic surveillance
  171. US upholds the right to search your laptop at the border without warrant
  172. The Value of a Hacked Email Account
  173. Social sites beat retailers, banks for user security and privacy
  174. Behold, the world’s most sophisticated Android trojan
  175. Microsoft works with financial services industry leaders, law enforcement and others
  176. Microsoft Security Bulletin Advance Notification for June 2013
  177. Botnets now routinely using P2P to evade detection...
  178. Windows 8.1 fingerprint reader support includes option to secure ...
  179. Oracle reveals plans for Java security improvements
  180. Koobface back from the dead as pump and dump spam surges
  181. The secret to online safety: Lies, random characters, and a password manager
  182. Australian government announces its National Cloud Computing Strategy
  183. Penetration testing: IT professionals demonstrate how hackers can access webcams
  184. Carna Botnet Analysis Renders Scary Numbers on Vulnerable Devices
  185. Spam catchers catching spammers better
  186. Malware-splosion: 2013 Will be Malware's Biggest Year Ever
  187. Five steps to ultimate Firefox security
  188. Think you have a strong password? Hackers crack 16-character passwords...
  189. Chromium browser gets new reset options for easier recovery from malware
  190. Security is hard, insecurity is easy – demonstrating a simple misconfiguration risk
  191. Network security deteriorating, privacy a lost cause
  192. Google upgrading all SSL certificates to 2048-bit keys by end of 2013
  193. MVPS Host File - May Update
  194. Skype Beta Plugs IP Resolver Privacy Leak
  195. The dangers of downloading software from unofficial sites
  196. 13 steps to turn on Twitter’s 2-step authentication
  197. US urged to permit self-defense retaliation on hackers
  198. Think your Skype messages get end-to-end encryption? Think again
  199. Researchers find critical vulnerabilities in popular game engines
  200. How safe are our routers
  201. The future of passwords: how sharing with your friends can beef up your security....
  202. Congress asks Google if and how it's protecting privacy with Glass
  203. Info-stealing Dorkbot worm spreading on Facebook
  204. One step forward, two steps back.
  205. Mozilla postpones by-default cookie blocking in Firefox
  206. Google security: You (still) are the weakest link
  207. Speed Up PC Performance by Replacing Microsoft's Built-In Antivirus
  208. Microsoft: Invulnerable software is not possible
  209. Internet Explorer 10 blocks more malware than Chrome or Firefox, test finds
  210. Adobe unleases critical patches for ColdFusion, Reader and Flash
  211. Mozilla pushes out new Firefox and Thunderbird: 8 security advisories, 3 critical fix
  212. May Patch Tuesday critical for users of Internet Explorer and web-based services
  213. Microsoft warns of new Trojan hijacking Facebook accounts
  214. Hackers breached Washington state court with Adobe ColdFusion flaw
  215. An unholy alliance - Fake Anti-Virus, meet Bogus Support Call!
  216. Advance Notification Service for the May 2013 Security Bulletin Release
  217. Stealthy malware spreading among popular Web servers
  218. Windows 7 patch KB 2670838 fries Firefox fonts
  219. Microsoft releases fix-it for Internet Explorer 8 vulnerability
  220. Malwarebytes adds antivirus scanning to cloud backup software
  221. How hackable is your password? McAfee offers password tips.
  222. PSA: Call of Duty: Ghosts “beta invite” imposter websites on the prowl
  223. Microsoft confirms exploit in Internet Explorer 8
  224. Complexity of Windows 8 OS makes it vulnerable to attack
  225. Who has your back? Which companies protect your data from the Government.
  226. Antivirus is ailing: Here are 5 firms ready to replace it
  227. Should Information Security Professionals be Licensed to Practice?
  228. Mozilla moves to stop spyware company from spoofing Firefox
  229. Beware of encryption companies bearing gifts!
  230. Printers, routers used as bots in DDoS attacks
  231. Hacking suspect arrested for 'biggest cyberattack in history'
  232. Would you let a spammer give you a root canal? Sure you would!
  233. Alert: Skype account hijack technique may affect all users
  234. Hackers target shared Web hosting servers for use in mass phishing attacks
  235. Microsoft re-releases botched patch as KB 2840149, but problems remain
  236. The Redkit malware exploit gang has a message for security blogger Brian Krebs
  237. Exploding the urban myths about how to stay safe online
  238. Man Convicted of Hacking Despite Not Hacking
  239. 5 hot security defenses that don't deliver
  240. KB2839011 Released to Address Security Bulletin Update Issue
  241. Our Internet privacy is at risk -- but not dead (yet)
  242. Virus Protection Guide
  243. New Windows 8 Blue Leak Confirms Additional Features
  244. Why You Don’t Need to Run Manual Antivirus Scans (And When You Do)
  245. Steve Gibson's Fingerprint service detects SSL man in the middle spying
  246. WinPatrol 28 Responds to User Feedback
  247. Anatomy of a phish - how to spot a Man-in-the-Middle attack, and other security tips
  248. Just how much malware is on free porn sites?
  249. Guide to SSL Certificates
  250. Chrome Download Warnings Target Malicious Binaries