: Computer Security News

Pages : 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22

  1. Facebook Users Fall Victim to Social Empires Cheat Scam
  2. Mozilla Lightbeam Tracks Your Online Activity
  3. 12-year-old Canadian boy admits to hacking police and government sites for Anonymous
  4. Microsoft rolls out 'reliability' patch for Internet Explorer 11
  5. WordPress 3.7 with automatic security updating is out now
  6. Crypto Locker Virus Holds Your Computer Hostage
  7. Why you should not use autocomplete
  8. Safari sandboxes Flash Player to protect OS X Mavericks
  9. Researchers Isolate Blackhole Exploit Kit Symptoms, Pinpoint Infected Twitter Account
  10. Microsoft and Symantec push to combat key, code-signed malware
  11. Nymaim: Browsing for trouble
  12. Prevent Google from displaying your Name, Image in Ads & Clear Synced data in Chrome
  13. Chrome’s Solution to the Unsavvy Poses A Potential Risk
  14. Cisco fixes serious security flaws in networking, communications products
  15. New fingerprint ID system scans for living blood – and is “solution to cybercrime”...
  16. Mevade botnet infects hundreds of organisations in suspected data theft attack
  17. Phone Scammers Take A Move From The Ransomer’s Playbook
  18. SUPERAntiSpyware Review: Free spyware & malware removal security software for Windows
  19. Firefox community roiled by Java crackdown
  20. LastPass vs. KeePass
  21. Warning overload? Half of PC users ignore virus alerts ...
  22. Online child abuse study examines nasty new trends including sextortion
  23. Google launches new service to protect against censorship, cyber-attacks
  24. DDoS attacks are likely bombarding the U.S. as we speak
  25. Warning over “risky” behavior of under-12s online – and parents need to take action,
  26. How your online data is being packaged and sold
  27. Tips for tougher passwords
  28. Brace for stronger DDoS attacks, security firm warns
  29. The Price of Online Security
  30. Secure Your Wireless Router: 8 Things You Can Do Right Now
  31. Malcovery Security: The company spammers and phishers hate
  32. Windows RT 8.1 update temporarily pulled due to a “situation”
  33. Skycure Hacked My iPhone To Prove They Can Protect It
  34. The New Age Of Anonymous Email: Why Do You Still Give Yours Out?
  35. You’re infected—if you want to see your data again, pay us $300 in Bitcoins
  36. Security education cuts both ways - why marketers need retraining too
  37. How to risk your job in 7 security mistakes
  38. Dirty Dozen spam sending nations - find where you finished in our Q3 SPAMPIONSHIP cha
  39. A prompt to save the world: new security features against malware in AutoCAD
  40. Hackers Reported Shifting Focus to Web Ports
  41. Cybersecurity where kids are concerned
  42. Webroot Proves 'Secure' Need Not Mean 'Slow'
  43. 10 Years of Patch Tuesdays. Where's the Cake?
  44. Hackers hit PR Newswire, data shows up alongside recently stolen Adobe code
  45. Hard numbers, chilling facts: What the government does with your data
  46. Why Would You Ever Need To Block Calls To Your Phone?
  47. Hackers use botnet to scrape Google for vulnerable sites
  48. Malwarebytes Anti-Malware Mobile has been released!
  49. McAfee Tanks Independent AV Test
  50. Oracle's Critical Patch Update includes 127 fixes, 51 alone for Java
  51. Is cybersecurity by fiat dead on arrival?
  52. 'Jump boxes' improve security, if you set them up right
  53. Phishing is for the birds
  54. Stealthy technique fingerprints smartphones by measuring users’ movements
  55. Security experts recommend safeguards with Chrome personal data store
  56. Yahoo to encrypt webmail sessions by default starting January
  57. Facebook's "Who can look up your timeline by name" privacy tool bites the dust
  58. Security Google Switches On Browser Spy Cam in Chrome
  59. Monday review - the hot 24 stories of the week
  60. Thousands of Sites Hacked Via vBulletin Hole
  61. Cyber-warriors, your country needs you: Governments hit by “shortage” of experts
  62. How your identity gets swiped even if you're careful
  63. Some D-Link routers contain “backdoor” which allows remote access, researcher warns
  64. Biggest data security threats come from inside, report says
  65. What Microsoft Didn't Say on Patch Tuesday
  66. Cryptolocker Ransomware: What You Need To Know
  67. Google May Feature You In An Ad With 'Shared Endorsements' (Unless You Opt-Out)
  68. Fake support phone calls could lead to identity theft
  69. Abusing data should be a felony
  70. Top sites (and maybe the NSA) track users with “device fingerprinting”
  71. Destructive malware "CryptoLocker" on the loose - here's what to do
  72. Microsoft supports continuing work toward a Do Not Track standard
  73. How to prevent sextortion threats via a compromised webcam
  74. Security tips for digital nomads
  75. Goodbye, tracking cookies? Don't celebrate just yet
  76. Adobe's source code was parked on hackers' unprotected server
  77. Internet Explorer 11 Blocker Toolkit
  78. Nordstrom Finds Cash Register Skimmers
  79. Tech Support Scams: Coming to a Mac near you
  80. Online safety is our shared responsibility
  81. Update: Skype being investigated over NSA spying links
  82. Redirect hides browser extension
  83. Cisco patches vulnerabilities in some security appliances, switches, and routers
  84. Google Chrome 'Fails to Protect Sensitive Personal Data'
  85. Security essentials: What is two-factor authentication?
  86. Microsoft Security Bulletin MS13-082 - Critical
  87. ‘Bulletproof’ Hoster Santrex Calls It Quits
  88. FYI > Update is available that enables you to delete outdated Windows updates.......
  89. Fake shopper scam recruits money mules
  90. Microsoft pays out its first $100,000 bug bounty
  91. Google to pay rewards for open-source code security fixes
  92. Fake shopper scam recruits money mules
  93. Our commitment to Microsoft antimalware
  94. Malicious Software Removal Tool (MSRT) October 2013 – Shiotob
  95. 3 essential techniques to protect your online privacy
  96. Vulnerability in Microsoft Antimalware Client Could Allow Elevation of Privilege
  97. Patch Tuesday brings crucial IE fix
  98. Hijacking of AV firms’ websites may be linked to hack on Network Solutions
  99. Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2885084)
  100. Blackhole exploit kit author reportedly arrested, changes already noticeable
  101. Phone charger can place user on malware alert
  102. Security updates available for Adobe Reader and Acrobat
  103. Microsoft pays out $28K to IE bug hunters in its first-ever bounty program
  104. 5 Wi-Fi security myths you must abandon now
  105. Updated! Microsoft Security Bulletin Summary for October 2013
  106. Malwarebytes puts antivirus cleanup program on a USB stick
  107. Beware: Your browsing habits expose privacy preferences
  108. Failure to patch leaves many WordPress sites vulnerable
  109. Who goes there? Voice-recognizing biometrics are set to take off, ...Who goes there?
  110. 7 top tactics of hack attacks
  111. Microsoft Patch Tuesday - get ready for a bumper Tenth Birthday edition!
  112. Breaking bad: Drugs, bots, hackers, and cyber insecurity
  113. NSA using Firefox flaw to snoop on Tor users
  114. The Tor teardown, brought to you by goats, giraffes, and Thor's hammer
  115. Silk Road bust, Adobe breach and Lavabit chutzpah - 60 Sec Security [VIDEO]
  116. Get Cyber Safe
  117. Cheeky Lavabit *did* hand over crypto keys to US government after all ...
  118. Goodbye Microsoft Security Essentials: Microsoft Now Recommends You Use a Third-Party
  119. ZXX: Privacy font
  120. McAfee reveals sharp rise in malware signed with legitimate digital certificates
  121. 'Anonymous attackers' in court over cyber-attacks
  122. New proof-of-concept tool detects stealthy malware hiding in graphics cards
  123. Adobe Servers Hacked, 2.9 Million Customers Affected
  124. Here be dragons: Explorer “in dangerous territory” after public IE exploit release?
  125. Microsoft Security Bulletin Advance Notification for October 2013
  126. Facebook Graph Search can now paw through your posts and status updates
  127. Bitcoin Talk forum hacked hours after making cameo in Silk Road takedown
  128. Privacy xkcd: what’s your personality type?
  129. Yahoo offers its first tepid bug bounty
  130. State-backed hackers: You think you're so mysterious, but you're really not – report
  131. Silent Circle: NIST encryption standards untrustworthy
  132. It’s National Cyber Security Awareness Month! So be aware of an IE 0-Day!
  133. 10 encryption tips for the enterprise
  134. Symantec takes on one of largest botnets in history
  135. SophosLabs prepares for great showing at Virus Bulletin 2013
  136. Getting warmer? New Hotspot 2.0 “could offer safer public Wi-Fi”
  137. Hackers just POURING through unpatched Internet Explorer zero-day hole
  138. Brute-force malware targets email and FTP servers
  139. Forget fingerprints: Your iris is your new identity
  140. Hidden click fraud botnet uncovered
  141. Former Microsoft privacy adviser: 'I don't trust Microsoft now'
  142. British teen accused of massive Spamhaus DDoS attack arrested months ago
  143. WordPress sites stick with vulnerable versions despite worrying rise in attacks
  144. “One click, then boom”: Spear-phishing could “black out” energy companies........
  145. In computers, are random numbers really random?
  146. Java called favorite target for hack attacks this year
  147. Microsoft releases latest Law Enforcement Requests Report - no Skype content...
  148. Hackers target social media, step up mobile attacks
  149. Microsoft’s copyright bots ask Google to hide Microsoft.com links
  150. Copying fingerprints, Firefox trusted, Facebook not, Yahoo recycles - 60 Sec Security
  151. IE zero-day vulnerability exploited more widely than previously thought
  152. Microsoft received 37,000 end-user data requests in first half of year
  153. SIM card hacker: Bug is either 'a backdoor, gross negligence, or both'
  154. Spear-phishing is “super-strain” of bacteria threatening business, investor warns
  155. Walk this way! Forget fingerprints – could our daily habits be the passwords.........
  156. MS Malware Protection Center. Mevade and Sefnit: Stealthy click fraud
  157. French could serve up fines to Google for privacy violation
  158. Evaluating our protection performance and capabilities
  159. For hire: Elite “cyber mercenaries” adept at infecting Windows and Macs
  160. Malicious browser extensions pose a serious threat and defenses are lacking
  161. Thousands of Wordpress blogs compromised to perform DDOS attack
  162. Future cyber attacks could attack medical implants – or wage “psychological war” in v
  163. Rogue iMessage Chat Client Found in Play Store
  164. Microsoft: Security Essentials provides "baseline" protection
  165. End of support for Java SE 6
  166. Win32/Napolar – A new bot on the block
  167. Vanishing rights: stop your online privacy from disappearing
  168. Oracle: We're getting Java security under control
  169. Hacker video shows how to thwart Apple's Touch ID
  170. UK's Get Safe Online? 'No one cares' - run the blockbuster ads instead
  171. Identity theft service planted botnets in LexisNexis, other data providers
  172. Ransomware criminals attack SMEs using strong file encryption, ESET warns
  173. California gives teens an 'eraser button' to hide online skeletons
  174. Yahoo recycled ID users warn of security risk
  175. SkyDrive stumbles, becomes latest cloud app to get glitchy
  176. 'Watering holes' join Java as a major threat to corporate security, says F-Secure
  177. What story do your emails tell about you?
  178. How I hacked SIM cards with a single text - and the networks DON'T CARE
  179. Firefox burns Chrome in our trustworthy browser poll
  180. Internet Explorer Security Flaw Impacting Business Users
  181. Java updates too much of a bother? Maybe online banking's just not for you
  182. New OS X Trojan found and blocked by Apple's XProtect
  183. LinkedIn denies harvesting user email accounts without permission
  184. Banking (Apps) on Google’s Android
  185. Cybercriminals trying new tactics, security body warns ...
  186. Symantec identifes 'Hidden Lynx' as hackers co-op
  187. Can’t keep a bad man down: “Shylock” Trojan returns to attack U.S. banks
  188. Bank robbers pose as IT guys, rig device to slurp £1.3m from Barclays
  189. How Secure Is My Password: The Ultimate Litmus Test
  190. Win Bitcoins, booze and cash! Be the first to crack the iPhone's Touch ID fingerprint
  191. European Commission calls for single privacy law in wake of PRISM snooping
  192. Facebook "Likes" gain constitutional protection for US employees
  193. Patch Monday: A way to avoid more Microsoft Automatic Update fiascos
  194. LinkedIn users sue over service's "hacking" of contacts and spammy ways
  195. How To Make Your Entire Internet Life More Secure In One Day
  196. Defending against web-based malware: Spot the smoke, don't wait for fire
  197. For your security, please email your credit card and driver’s license ...
  198. 'Kissing couple' Trojan sent to slurp fanbois' data...
  199. What Pinterest’s decision to support Do Not Track means for users (and nonusers)
  200. Ahoy, me hearties! Check your almanacks, for today be Talk Like a Pirate Day, arrr!
  201. Microsoft Security Bulletin MS13-023 - Critical
  202. Ransomware Puts Your System To Work Mining Bitcoins
  203. Revoyem Ransomware Sinks to New Low
  204. Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone
  205. Security researchers create undetectable hardware trojans
  206. Surreptitiously Tampering with Computer Chips
  207. Fake card reader “texts” PINs to thieves instantly – and drains bank accounts...
  208. Why You Don’t Need an Outbound Firewall On Your Laptop or Desktop PC
  209. Hacktivism Long passwords are good, but too much length can be a DoS hazard
  210. Meet Hidden Lynx: The most elite hacker crew you’ve never heard of
  211. Security Advisories for Firefox
  212. Microsoft Security Advisory (2887505) Vulnerability in Internet Explorer...
  213. Researchers find new, ultra-low-level method of hacking CPUs...
  214. NIST cybersecurity framework: Your insurance company is watching
  215. NSA snoops on credit card transactions, says report
  216. WHOIS Privacy Plan Draws Fire
  217. Remote Desktop (RDP) Hacking 101: I can see your desktop from here!
  218. How to find out what the data miners know about you
  219. It's about time: Java update includes tool for blocking drive-by exploits
  220. Microsoft's swipe'n'swirl pic passwords LESS secure than PINs, warn researchers
  221. Shame on you! Report shows users lazier than ever about security practices
  222. Tibet-targeting Mac OS malware rears its head again
  223. Microsoft reissues September patches after user complaints
  224. Companies that allow home working “ignore security risks”, report claims
  225. The end? “Passwords are done,” says Google security chief
  226. Dropbox takes a peek at files
  227. Phishing warning after Vodafone hack leaks personal information...
  228. The iPhone 5s fingerprint reader: what you need to know
  229. Firefox Android zero-day allows execution of malicious code
  230. A scam-spotters guide: Ten things your bank will NEVER do – but cybercriminals will
  231. Uncovering an Android botnet involved in SMS fraud
  232. Microsoft confirms stability fixes messed up Outlook 2013
  233. Microsoft botches still more patches in latest Automatic Update
  234. IPhone jailbreakers begin cracking their knuckles over iOS 7
  235. Multiple Oracle and Adobe Product Security Updates are Available – Update Now
  236. Update for Outlook 2013 breaks folder pane
  237. Biz bods STILL don't patch hacker's delight Java and Flash
  238. Microsoft Malicious Software Removal Tool (MSRT) September 2013 - Win32/Simda
  239. Four out of five people are “locked out” of websites due to lost passwords
  240. MaskMe Is Now Your Worldwide Call Blocker: Introducing International Masked Phones
  241. Of course NSA can crack crypto. Anyone can. The question is, how much?
  242. Anatomy of a phish - a "generic mass targeted attack" against WordPress admins
  243. Why should you trust Google, Facebook more than the NSA?
  244. Yahoo: More than 12,000 US data requests led to disclosures more than 11,000 times
  245. Trust no one, advises security expert after NSA revelations
  246. Spooks break most Internet crypto, but how?
  247. Half of Internet users worry over personal info exposed online
  248. Google speeding up end-to-end crypto between data centers worldwide
  249. ‘SBC’ botnet to blame for Tor traffic surge?
  250. Password Generator Magic: Don’t Take On A Difficult Job Alone