: Computer Security News


Pages : 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

  1. Watermarks used to track data through Dark Web to Russia, Nigeria
  2. Firefox helps you cover your assets with latest Tracking Protection feature
  3. Older Versions of OS X Remain Vulnerable to Rootpipe ‘Hidden Backdoor API’
  4. What a lot of patches! 60 Sec Security [VIDEO]
  5. National Power Grid suffers frequent cyberattacks, says report
  6. hreatpost News Wrap, April 10, 2015
  7. NHS data security: lessons to be learned
  8. Lost in the clouds: Your private data has been indexed by Google
  9. Vulnerability in common hotel routers threatens guest devices
  10. Don’t Be Fodder for China’s ‘Great Cannon’
  11. Botnet activity inside organisations predicts likelihood of future data breach
  12. Beware: “Halifax Classic” Phishing Mail
  13. UK users still don't trust fancy new Internet top-level domains, study finds
  14. TorLocker victims can decrypt most files without paying ransom
  15. A history lesson brought to you by the Nuclear exploit kit
  16. White Lodging Services confirms second payment card breach
  17. Your identity has already been stolen, ‘Catch Me If You Can’ subject warns US citizen
  18. AlienSpy: Taking Remote Access Trojans to the next level
  19. 7 security mistakes people make with their mobile device
  20. In a mock cyberattack, Deloitte teaches the whole business how to respond
  21. Cloud computing brings changes for IT security workers
  22. Hackers hide malware in fake game pages hosted on Steam
  23. FBI warns WordPress users of ISIS threat: Patch and update now
  24. Chrome extension collects browsing data, uses it for marketing
  25. Apple fixes loads of security holes in OS X, iOS, Apple TV, Safari
  26. Court might force US to reveal details of secret wireless kill switch
  27. What happens to data after a breach?
  28. A MILLION Chrome users' data was sent to ONE dodgy IP address
  29. Home Security 2015: The Internet Of Things (IoT) Brings Innovation AND Danger
  30. New crypto-ransomware "quarantines" files, downloads info-stealer
  31. Malvertising from Google advertisements via possibly compromised reseller
  32. FAA hit by cyberattack, finds no damage
  33. HITRUST to Launch First Comprehensive Study of Targeted Cyber Threats Impacting ...
  34. DARPA's plan to make software security "the domain of machines"
  35. Week in review: Security tips for DevOps, and how security pros deal with cybercrime
  36. Update for Windows 7 and 8.1 silently installs Windows 10 downloader
  37. An update on Microsoft’s approach to Do Not Track
  38. Monday review - the hot 22 stories of the week
  39. Google Lets SMTP Certificate Expire
  40. Dell System Detect Vulnerability now classified as a PUP
  41. Mozilla Adds Opportunistic Encryption for HTTP in Firefox 37
  42. Big Blue securo-bods warn of dire Dyre Wolf AMONG WOLVES
  43. Microsoft Windows Defender
  44. Energy companies around the world infected by newly discovered malware
  45. $60 DIY car hacking device is an inexpensive and easy way to hack cars
  46. Google cracks down on browser ad injectors after shocking study
  47. 22 Million PUA detected last month. STOP!
  48. Admin rights to blame for 97 percent of critical Microsoft flaws - Report
  49. Microsoft releases mystery Windows patch KB 3035583
  50. Smart home hacking is easier than you think
  51. Is it safe to use public Wi-Fi networks?
  52. Hackers set up Pirate Bay clone to distribute banking trojan
  53. VMware Updates Products to Address Java Vulnerabilities
  54. US teen pleads guilty to $100 million gaming hack
  55. Many password strength meters are downright WEAK, researchers say
  56. Hacker exploits YouTube by deleting videos with one click
  57. "Do Not Track" to be disabled by default in future Microsoft web browsers
  58. The Dyre Wolf Campaign: Stealing Millions and Hungry for More
  59. Facebook 'tracks all visitors, breaching EU law'
  60. NewPosThings Has New PoS Things
  61. ‘Revolution’ Crimeware & EMV Replay Attacks
  62. TrueCrypt Audit Phase II completed: 4 vulnerabilities identified
  63. New Malwarebytes Anti-Exploit version is out
  64. 30 Percent of Companies Would Negotiate Data Ransom With Cybercriminals: Survey
  65. Obama Approves Sanctions on Cyber-Attackers
  66. SEO Scams and Semi-Scams
  67. Microsoft pushing Skype as an ‘optional’ Windows Update KB2876229
  68. Mixing Mutex: The New Malware Medley?
  69. Dangerous memory of your graphics adapter
  70. Default Setting in Windows 7, 8.1 Could Allow Privilege Escalation, Sandbox Escape
  71. Researchers identify malware threat to virtual currencies
  72. Half of Android devices open to silent hijack
  73. Huge spam operation on Twitter uncovered
  74. This router hack is injecting ads and porn into random websites
  75. One in three top Alexa websites is risky
  76. Europol chief warns on computer encryption
  77. Google Chrome and Gentoo Linux More Vulnerable than Internet Explorer in 2014
  78. Instagram API Bug Could Allow Malicious File Downloads
  79. Dark Web vendors offer up “thousands” of Uber logins starting at $1 each
  80. Researchers figured out how to hack computers using heat
  81. Dell support tool put PCs at risk of malware infection
  82. Microsoft blacklists latest rogue SSL certificates, Mozilla mulls sanctions for issue
  83. Leave Facebook if you value your privacy, says EU
  84. Half of enterprises have no budget at all for mobile security, survey finds
  85. The programs with the most security vulnerabilities in 2014 were not the ones...
  86. Android apps track your location every three minutes, says Carnegie Mellon study
  87. "Probably tired and shagged out after a long squawk" - 60 Sec Security [VIDEO]
  88. Hotel Networks Vulnerable to Wi-Fi Flaw
  89. Single-use Yahoo Passwords – Good or Bad?
  90. Why Your Windows PC Isn’t Genuine (and Exactly How That Limits You)
  91. The state of open source security
  92. Security best practices for users is your first line of defense
  93. Windows Defender's malware protection still leaves much to be desired after...
  94. NSA Doesn’t Need to Spy on Your Calls to Learn Your Secrets
  95. 13-Year-Old Weakness in RC4 Encryption Breaks SSL/TLS
  96. Microsoft at RSA conference USA 2015, April 20-24
  97. Tax Fraud Advice, Straight from the Scammers
  98. Android hijacking bug may allow attackers to install password-stealers
  99. Despite privacy policy, RadioShack customer data up for sale in auction
  100. Adult site Xtube compromised, serving exploits
  101. India strikes down controversial "Section 66A" social media policing law
  102. EU: Don’t use Facebook if you want to keep the NSA away from your data
  103. Where Did VirusBarrier iOS Go?
  104. New malware program PoSeidon targets point-of-sale systems
  105. Week in review: Security risks of networked medical devices, mobile apps...
  106. Scheduled Tasks
  107. Hilton Honors Flaw Exposed All Accounts
  108. Security Think Tank: Enhanced cyber security requires change in attitude
  109. Patched Adobe Flex vulnerability remains threat to web domains
  110. Important Notice About Your Twitch Account
  111. Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware
  112. Want to hide your metadata? You probably can't
  113. Everything is insecure and will be forever says Cisco CTO
  114. Trumping cybercriminals during tax season: Tips on how to stay safe
  115. Yoast Google Analytics Plugin Patches XSS Vulnerability
  116. Signature antivirus' dirty little secret
  117. Home devices threaten enterprise data security, warn researchers
  118. Hacking BIOS Chips Isn’t Just the NSA’s Domain Anymore
  119. Nuclear Exploit Kit Adds Code for Leveraging Newly Patched Flash Player Flaw
  120. Is Yahoo’s On-Demand Password a Bad Move?
  121. Apple: Those security holes we fixed last week? You're going to need to repatch
  122. Fake job seeker's emails deliver ransomware and info-stealer
  123. All four major browsers take a stomping at Pwn2Own hacking competition
  124. Our VPN Service Takes Your Privacy Seriously
  125. A Clever Way to Tell Which of Your Emails Are Being Tracked
  126. China reveals existence of cyber warfare hacking teams
  127. OpenSSL Patch to Plug Severe Security Holes
  128. Watch out for these 9 information security threats
  129. At least 700,000 routers that ISPs gave to their customers are vulnerable to hacking
  130. Security flaw in WordPress plugin Google Analytics by Yoast exposed
  131. Opera acquires VPN firm SurfEasy to boost browsing security
  132. Double FREAK! A cryptographic bug that was found because of the FREAK bug
  133. The NSA Is Going to Love These USB-C Charging Cables
  134. There are known vulnerabilities in Server 2003 that won’t be fixed
  135. The new MacBook's single port comes with a major security risk
  136. The UK’s 10 most infamous data breaches
  137. Experts: Don’t blame the victims of youth ‘selfies’
  138. Premera cyberattack could have exposed information for 11 million customers
  139. Patch Tuesday: Windows 8.1 and VMware VDI Hit with LogonUI Error
  140. Microsoft Blacklists Fake Windows Live SSL Certificate
  141. Scammers Are Using a Fake Version of AdwCleaner to Trick People
  142. Microsoft releases EMET 5.2
  143. Bogus SSL certificate for Windows Live could allow man-in-the-middle hacks
  144. D-Link Patches Two Remotely Exploitable Bugs in Firmware
  145. Exploit kits in 2015: What can we expect?
  146. Apple Pay: Bridging Online and Big Box Fraud
  147. Can the NSA Break Microsoft's BitLocker?
  148. How to tell if you have the latest Java and Adobe versions Adobe
  149. Yahoo puts email encryption plugin source code up for review
  150. Apple Watch worries security advocates
  151. Raising the Stakes: When Software Attacks Hardware
  152. EquationDrug: Sophisticated, stealthy data theft for over a decade
  153. 2,400 unsafe apps on user phones in large firms
  154. A cyber war staged in central London
  155. If you hammer your RAM, won't that break it? 60 Sec Security [VIDEO]
  156. Bypassing ASLR with CVE-2015-0071: An Out-of-Bounds Read Vulnerability
  157. Obama administration seeks more power to tackle botnets
  158. Critical hole in popular WordPress SEO plugin allows SQLi, site hijacking
  159. Tripwire Announces Capture the Flag Cyber Security Competition
  160. Women in Federal cybersecurity – How did they get their start?
  161. New anti-terrorism unit will tackle extremist content on the web
  162. Facebook Worm Lures with Promise of Smut Content, Delivered via Box Cloud Storage
  163. Cyber crooks take advantage of ad bidding networks to deliver ransomware
  164. Hey Siri, How Come Strangers Are Listening To My Private Messages?
  165. The human cost of phone hacking
  166. Cortana and my privacy FAQ
  167. Microsoft Fixes Stuxnet Bug, Again
  168. MS Update 3033929 Causing Reboot Loop
  169. Security updates available for Adobe Flash Player
  170. Defending Against PoS RAM Scrapers
  171. Kaspersky claims to have found NSA's 'space station malware'
  172. UK surveillance 'lacks transparency', ISC report says
  173. Malware “TreasureHunter” innovates by using windows products IDs ...
  174. Part 1: New data on youth “nudes” show disturbing trend
  175. Certificate Reputation for website owners
  176. Twitter Now Tracking User IP Addresses
  177. The next generation of CryptoWall malware emerges
  178. Panda antivirus labels itself as malware, then borks EVERYTHING
  179. Computer-stored encryption keys are not safe from side-channel attacks
  180. Wikimedia v. NSA: Wikimedia Foundation files suit against NSA to challenge ...
  181. Rowhammer Hardware Exploit Poses Threat to DRAM Memory in Many Laptops, PCs
  182. OpenDNS trials system that quickly detects computer crime
  183. Patched Windows PC remained vulnerable to Stuxnet USB exploits since 2010
  184. March 2015 Updates
  185. ID Fraud Totals $16Bn in US for 2014
  186. Email spoofing security hole discovered in Google Admin console
  187. Yet Another Cleaner, Yet Another Stealer
  188. From the Labs: New developments in Microsoft Office malware
  189. Week in review: FREAK flaw, a new PoS malware family, and the new issue of (IN)SECURE
  190. Samba Remote Code Execution Vulnerability – CVE-2015-0240
  191. Adobe invites help with hunting vulnerabilities, but no bounty money
  192. Apple and Google prepare patches for FREAK SSL flaw
  193. We Weren't Surprised CSI:Cyber Gets InfoSec Wrong. Were You?
  194. Fake "Flash Player Pro" update delivers password-stealing Trojan
  195. Litecoin-mining code found in BitTorrent app, freeloaders hit the roof
  196. UK man arrested on suspicion of US Department of Defense hacking
  197. NCC Group to audit OpenSSL for security holes
  198. How to ensure your hot-desking colleagues keep their data secure
  199. Microsoft Security Essentials last in banking trojan detection test
  200. Malware-spreading drive-by attack relies on hacked GoDaddy accounts
  201. Abine launches Bitcoin Anywhere
  202. MRG Effitas releases latest Online Banking Browser Security report
  203. Tracking the FREAK Attack
  204. Security Advisory 3046015 released
  205. Avoid the “March Twitter Lottery”…
  206. Malicious DNS Servers Deliver Fareit
  207. Mandarin Oriental Hotels Hit in Credit Card Breach
  208. Stop the presses: HTTPS-crippling “FREAK” bug affects Windows after all
  209. New PoS malware family discovered
  210. Security threats and the retail industry
  211. Apple and Google prepare patches for FREAK SSL flaw
  212. Ransomware Hits Law Firm, Encrypts Workstation
  213. Mobile Threat Monday: Mysterious Android App Emails Your Location to Creepers
  214. Monitoring tools: user notification required
  215. Survey: Hardly Anybody Uses a Password Manager
  216. Toys “R” Us resets account passwords to counter stolen reward points
  217. Firewall: The king of network security
  218. Hackers impersonating IT staff popular tactic in data breaches, FireEye finds
  219. Insert Product Key: Y / N?
  220. Now you can easily send (free!) encrypted messages between Android, iOS
  221. In major goof, Uber stored sensitive database key on public GitHub page
  222. NSA authority to collect bulk phone data extended to June 1
  223. A Brief History of the Trusted Internet
  224. Bogus Search Engine Leads to Exploits
  225. Which operating system is the most secure? Four points to remember.
  226. The Enemy on your Phone
  227. Apple patent reveals tracking capabilities even if phone appears off
  228. TorrentLocker campaign uses email authentication to tune the operations
  229. Aggressive adware in Google Play apps
  230. WinPatrol v33.1.2015.0 Feb 26th, 2015
  231. 50,000 Uber driver names, license plate numbers exposed in a data breach
  232. Only 11 UK security firms included in global Cybersecurity 500
  233. Tasty Spam: Ebola Scam Infects Inboxes
  234. Email-Based Pharming Attack Exploits Router Flaws
  235. TalkTalk Client Data Stolen, Hackers Use It to Obtain Banking Info
  236. Most vulnerable operating systems and applications in 2014
  237. Lenovo.com hijack reportedly pulled off by hack on upstream registrar
  238. US Spymaster Warns Over Low-level Cyber Attacks
  239. Commercial spyware invades enterprises
  240. UPATRE Trojan Still Top Malware Attached to Spam
  241. Surveillance-based manipulation: How Facebook or Google could tilt elections
  242. Spam Uses Default Passwords to Hack Routers
  243. 62% of the Top 50 Download.com applications bundle toolbars and other PUPs
  244. Bank Regulator Eyes Tougher Rules to Fight Hacking
  245. $3m reward offered for alleged Gameover Zeus kingpin
  246. Security Sense: Superfish and Nasty Root Certs Are Bad, but It’s Worse than That
  247. Webnic Registrar Blamed for Hijack of Lenovo, Google Domains
  248. Ad-blocking software is 'worse than Superfish'
  249. What is malvertising?
  250. As many as 1 million+ WordPress sites imperiled by critical plugin bug