: Computer Security News


Pages : 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22

  1. Can’t keep a bad man down: “Shylock” Trojan returns to attack U.S. banks
  2. Bank robbers pose as IT guys, rig device to slurp £1.3m from Barclays
  3. How Secure Is My Password: The Ultimate Litmus Test
  4. Win Bitcoins, booze and cash! Be the first to crack the iPhone's Touch ID fingerprint
  5. European Commission calls for single privacy law in wake of PRISM snooping
  6. Facebook "Likes" gain constitutional protection for US employees
  7. Patch Monday: A way to avoid more Microsoft Automatic Update fiascos
  8. LinkedIn users sue over service's "hacking" of contacts and spammy ways
  9. How To Make Your Entire Internet Life More Secure In One Day
  10. Defending against web-based malware: Spot the smoke, don't wait for fire
  11. For your security, please email your credit card and driver’s license ...
  12. 'Kissing couple' Trojan sent to slurp fanbois' data...
  13. What Pinterest’s decision to support Do Not Track means for users (and nonusers)
  14. Ahoy, me hearties! Check your almanacks, for today be Talk Like a Pirate Day, arrr!
  15. Microsoft Security Bulletin MS13-023 - Critical
  16. Ransomware Puts Your System To Work Mining Bitcoins
  17. Revoyem Ransomware Sinks to New Low
  18. Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone
  19. Security researchers create undetectable hardware trojans
  20. Surreptitiously Tampering with Computer Chips
  21. Fake card reader “texts” PINs to thieves instantly – and drains bank accounts...
  22. Why You Don’t Need an Outbound Firewall On Your Laptop or Desktop PC
  23. Hacktivism Long passwords are good, but too much length can be a DoS hazard
  24. Meet Hidden Lynx: The most elite hacker crew you’ve never heard of
  25. Security Advisories for Firefox
  26. Microsoft Security Advisory (2887505) Vulnerability in Internet Explorer...
  27. Researchers find new, ultra-low-level method of hacking CPUs...
  28. NIST cybersecurity framework: Your insurance company is watching
  29. NSA snoops on credit card transactions, says report
  30. WHOIS Privacy Plan Draws Fire
  31. Remote Desktop (RDP) Hacking 101: I can see your desktop from here!
  32. How to find out what the data miners know about you
  33. It's about time: Java update includes tool for blocking drive-by exploits
  34. Microsoft's swipe'n'swirl pic passwords LESS secure than PINs, warn researchers
  35. Shame on you! Report shows users lazier than ever about security practices
  36. Tibet-targeting Mac OS malware rears its head again
  37. Microsoft reissues September patches after user complaints
  38. Companies that allow home working “ignore security risks”, report claims
  39. The end? “Passwords are done,” says Google security chief
  40. Dropbox takes a peek at files
  41. Phishing warning after Vodafone hack leaks personal information...
  42. The iPhone 5s fingerprint reader: what you need to know
  43. Firefox Android zero-day allows execution of malicious code
  44. A scam-spotters guide: Ten things your bank will NEVER do – but cybercriminals will
  45. Uncovering an Android botnet involved in SMS fraud
  46. Microsoft confirms stability fixes messed up Outlook 2013
  47. Microsoft botches still more patches in latest Automatic Update
  48. IPhone jailbreakers begin cracking their knuckles over iOS 7
  49. Multiple Oracle and Adobe Product Security Updates are Available – Update Now
  50. Update for Outlook 2013 breaks folder pane
  51. Biz bods STILL don't patch hacker's delight Java and Flash
  52. Microsoft Malicious Software Removal Tool (MSRT) September 2013 - Win32/Simda
  53. Four out of five people are “locked out” of websites due to lost passwords
  54. MaskMe Is Now Your Worldwide Call Blocker: Introducing International Masked Phones
  55. Of course NSA can crack crypto. Anyone can. The question is, how much?
  56. Anatomy of a phish - a "generic mass targeted attack" against WordPress admins
  57. Why should you trust Google, Facebook more than the NSA?
  58. Yahoo: More than 12,000 US data requests led to disclosures more than 11,000 times
  59. Trust no one, advises security expert after NSA revelations
  60. Spooks break most Internet crypto, but how?
  61. Half of Internet users worry over personal info exposed online
  62. Google speeding up end-to-end crypto between data centers worldwide
  63. ‘SBC’ botnet to blame for Tor traffic surge?
  64. Password Generator Magic: Don’t Take On A Difficult Job Alone
  65. Here's how to best secure your data now that the NSA can crack almost any encryption
  66. Microsoft to patch dangerous Outlook hack-by-preview bug next week
  67. Trendnet under fire from FTC over camera security flaws which let hackers spy...
  68. NetTraveler Variant Adds Java Exploits, Watering Hole Attacks to Bag of Tricks
  69. First case of Android Trojan spreading via mobile botnets discovered
  70. Advance Notification Service for September 2013 Security Bulletin Release
  71. “Rogue cellular devices” could allow attackers to block texts, intercept calls...
  72. Faces, gestures, heartbeats - how will the passwords of the future work?
  73. Lawyers report steep rise in employee data theft cases
  74. In a rush? Five two-minute tips to make yourself more secure right now
  75. Improve Your Facebook, Google & LinkedIn Privacy With AVG PrivacyFix
  76. Researchers: Oracle’s Java Security Fails
  77. Syrian Electronic Army Tries to Make Friends with U.S. Marine Corps
  78. Acxiom’s letting you see the data they have about you…kind of
  79. Selecting all PUPs
  80. Hesperbot – A New, Advanced Banking Trojan in the Wild
  81. The perfect security defense is right under our noses
  82. Database of illegal downloaders - are British ISPs to become the "music NSA"?
  83. Facebook spam “earning criminals $200m a year”, researchers claim
  84. The Murky Waters Of The Zero-Day Business
  85. Facebook flaw allowed hackers to delete posted photos
  86. Recipe for disaster? Four in ten “BYOD” owners use no security measures at all
  87. How Often Do You Review Online Privacy Settings?
  88. Even suspicious email is too tempting to skip, survey finds
  89. Encryption: types of secure communication and storage
  90. Dropbox dismisses hack demonstrated by developers
  91. Trojan entices Craigslist users with fake software freebie
  92. Internet dating scam - mother and daughter crime duo jailed
  93. Organisations lack visibility on malware attacks, survey confirms
  94. Big phish, small pond: How to stay safe from SMS phishing scams
  95. Windows 8 picture passwords “can be cracked”, researchers warn
  96. More than 800,000 Facebook users fall victim to password-harvesting browser malware,
  97. IE10 in Windows 8 comes with improved Flash Player Security, says Adobe
  98. Malware to Victims: “Because f*** you! That’s why.”
  99. Bug allows for use of 'sudo' in OS X without a password
  100. Potential dangers for Google Glass, other wearable computers
  101. Java 6 users vulnerable to zero day flaw, security experts warn
  102. 3 types of DNS attacks and how to deal with them
  103. Cisco fixes critical remote command execution vulnerability in Secure Access Control
  104. Tor usage doubles in wake of secure email shutdowns, arrival of PirateBrowser
  105. Developers hack Dropbox and show how to access user data
  106. Schools hire snoopers to monitor kids on social networks. Is it OK?
  107. Unpatched Mac bug gives attackers “super user” status by going back in time
  108. The 4-Step System To Sure-Fire Private Browsing
  109. Online tracking could kill your credit score
  110. Microsoft will craft XP patches after April '14, but not for you
  111. iOS and Android weaknesses allow stealthy pilfering of website credentials
  112. Malicious Chrome extensions on the rise
  113. New York Times, Twitter hacked as domain records altered
  114. Koobface worm-flinging gangster linked to pharma spam ops
  115. Millions of Android users open to attacks due to old versions of OS, FBI warns
  116. Protect Yourself This Semester with Cybersecurity Tips from Malwarebytes
  117. One in five adults have fallen victim to hackers – and one in 50 has lost more ...
  118. Fake Browser Updates Going Rampant
  119. Nymaim – obfuscation chronicles
  120. Download me II—Removing the remnants of the Web’s most dangerous search terms
  121. Which web browser do you trust?
  122. How might the feds have snooped on Lavabit?
  123. You can’t stop the NSA from tracking you, but you can make it harder
  124. Mozilla considers rejecting long-lived digital certificates...
  125. PayPal fixes critical account switcheroo bug after researcher tipoff
  126. How to keep children safe online (without looking over their shoulders all day)
  127. Mozilla 'Plug-n-Hack' project wants browsers to play nice with security software
  128. Five Security Myths Everyone Should Dismiss
  129. Windows 8 users shun Defender in favour of third-party antivirus, figures suggest
  130. Is Windows 8 a Trojan horse for the NSA? The German Government thinks so
  131. Android becomes Windows' equal as a target for hackers
  132. Oh, the Sites You Will Never See
  133. Microsoft needs your help to fix botched patch KB 2859537
  134. Avatar rootkit: the continuing saga
  135. New “anti-phishing” technology uses electronic cards, not passwords
  136. The 4 Keys to Preventing Credit Card Fraud Online
  137. Motorola Skip: Password security without the hassle (key restrictions apply)
  138. Second time's a charm! Microsoft tries again with Active Directory patch
  139. Microsoft predicts bleak future for XP users after patches run out
  140. Android becomes Windows' equal as a target for hackers
  141. The professionalization of malware
  142. No Malware Protection Is Perfect, Including Apple's
  143. LastPass password manager gets security patch against password leakage bug
  144. Microsoft KB2859537 Update Causes BSOD on Windows 7
  145. Cyber criminals add new exploit for recently patched Java vulnerability
  146. Hacker spies on and insults toddler in bed via baby monitor
  147. Hacktivism Once the province of Windows XP, Web servers are hackers’ target of choice
  148. JUST IN: Microsoft pulls more Patch Tuesday updates Topic: Security Discover F
  149. Miss Teen USA 2013 says sextortionist hacked webcam to snap bedroom photos
  150. Blaster from the past: The worm that zapped XP 10 years ago
  151. Buying Battles in the War on Twitter Spam
  152. Catch me if you can: Can we predict who will fall for phishing emails?
  153. Welcome to the “Internet of Things,” where even lights aren’t hacker safe
  154. Microsoft Security Bulletin MS13-066 - Important
  155. Google says Gmail users can't expect privacy
  156. YouTube download plug-ins hijack browsers to deliver malware-laced adverts
  157. eBay troll and fraudster 'Ebayisajoke' staked out and unmasked
  158. Google boosts flaw bounties to $5,000 on Chromium program
  159. Heads up for Patch Tuesday: 24 hours, 8 bulletins, 3 critical,........
  160. How to Let Someone Else Use Your Computer Without Giving Them Access.......
  161. London tosses out Wi-Fi-sniffing 'smart bins'
  162. XP's retirement will be hacker heaven
  163. How to Prevent People From Viewing Your Browser’s Saved Passwords
  164. Password thieves target blogs, content management sites
  165. How Attackers Actually “Hack Accounts” Online and How to Protect Yourself
  166. Warning over security flaws in HP printers which can reveal passwords
  167. Cyber security pros in high demand, highly paid, and highly selective
  168. New security scheme hits text spammers in hours
  169. Security flaw with a difference - the Xerox scanner that makes your house smaller!
  170. Whiter-than-white hats, malware, penalty and repentance*
  171. Microsoft to clean up after Oracle's patch mess again next week
  172. Mozilla bridges Gmail to Persona log-in
  173. Advance Notification Service for August 2013 Security Bulletin Release
  174. Backdoor in popular ad-serving software opens websites to remote hijacking
  175. A Good Example of Why Having Your Browser Save Passwords Might be a Bad Idea
  176. New strain of ransomware evades detection by AV apps
  177. Chrome password security issue stirs debate
  178. Firefox 23 lands with a new logo and mixed content blocking
  179. “Worst of the worst” abuse images may be being used to spread Trojan, charity warns
  180. Windows Phones open to hackers when connecting to rogue Wi-Fi
  181. How do you stop HTTPS-defeating BREACH attacks? Let us count the ways
  182. Windows worm accidentally bundled with KFC Android app
  183. toilet hackers
  184. Researchers Develop DIY System to Detect Malware on Mobile Phones
  185. Email security strongest from social media, report reveals
  186. Firefox Zero-Day Used in Child Porn Hunt?
  187. Microsoft Security Advisory (2876146)
  188. Bulletproof Inbox: Tips for staying safe (and sane) on email
  189. What do a banking Trojan, Chrome, and a government mail server have in common?
  190. Java adverts can be used to create million-strong botnets for just $500
  191. FBI spooks use MALWARE to spy on suspects' Android mobes - report
  192. Humans still the weakest link as phishing gets smarter and more focused
  193. Wi-Fi routers: More security risks than ever
  194. Sandboxes Explained: How They’re Already Protecting You and How to Sandbox...
  195. Browser privacy tools still lack bite, security analysts say
  196. Crypto experts issue a call to arms to avert the cryptopocalypse
  197. Researchers demo exploits that bypass Windows 8 Secure Boot
  198. Chrome, Firefox users targeted with account-hijacking plugins
  199. Phishing attacks show sudden drop as criminals use servers for DDoS
  200. How a “malicious charger” infects iPhone with spyware in under a minute
  201. 5 tips to save money using online privacy tools
  202. avatar Best Free Antivirus: Windows Defender vs. Avast
  203. Facebook turns on secure browsing by default
  204. Researchers demo new IPv6 attack against Windows 8 PCs
  205. USB flash drives masquerading as keyboards mean more BYOD security headaches
  206. Microsoft’s new programs attract ‘bounty hunters’ who help make safer products
  207. Former Mozilla CEO to head security-software maker AVG
  208. DDoS attack sizes rise above 2Gbps for first time
  209. Should the "Reboot! Shut up and reboot!" theory be applied to programs?
  210. Stanford University hacked, becomes latest data breach victim
  211. Security Vendors: Do No Harm, Heal Thyself
  212. Feds tell Web firms to turn over user account passwords
  213. PayPal opens up bug bounty program to minors
  214. Open-source project Crypton seeks to make encryption easier
  215. Smishing: A Serious Identity Theft Scheme
  216. Android malware samples jump six-fold in Q2
  217. How Protecting Your Privacy Could Make You the Bad Guy
  218. Stop 80 percent of malicious attacks now
  219. The humble SIM card has finally been hacked:
  220. Tired of spam? Hand out a disposable email address
  221. Why You Don’t Need a Full Internet Security Suite
  222. Hack exposes e-mail addresses, password data for 2 million Ubuntu Forum users
  223. Ban passwords, say advocates of alternative authentication
  224. New vulnerability in Java 7 opens door to 10-year-old attack, researchers say
  225. Unusual file-infecting malware steals FTP credentials
  226. Bitcoin Mining by Botnet
  227. Attackers embedding back doors into image files
  228. Styx Crypt Makers Push DDoS, Anti-Antivirus Services
  229. Android malware that gives hackers remote control is on rise
  230. A fresh face for the Microsoft Malware Protection Center
  231. How to tackle JavaScript-based ransomware sites
  232. Family Safety > Help your kids use social websites more safely
  233. Video: Cyber-security and the broken web
  234. Family Safety > 4 Ways to Set Up Parental Controls On Your Home Network
  235. Family Safety > Stand up to online bullying
  236. Shadowlock ransom Trojan demands victims fill in survey for unlock key
  237. Safety & Security Center > Age-based guidelines for kids' Internet use
  238. Best Antivirus
  239. Privacy > Take charge of your online reputation
  240. IT security spend up, but in the wrong places, Oracle says
  241. Teach kids online security basics
  242. Even If You're Wise To Phishing, Spear Phishing Could Still Fool You
  243. Targeted attacks exploit now-patched Windows bug revealed by Google engineer
  244. Another botched Windows patch: MS13-057/KB 2803821/KB 2834904
  245. How Microsoft handed the NSA access to encrypted messages
  246. Microsoft on Wednesday sent its first email congratulations to a bug bounty recipient
  247. WhatsApp users, ignore messages from 'Priyanka' - it's a worm
  248. Are Short Passwords Really That Insecure?
  249. Who’s Behind The Styx-Crypt Exploit Pack?
  250. How elite security ninjas choose and safeguard their passwords