: Computer Security News


Pages : 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32

  1. Masque Attack II Targets iPhone Users Via App Store
  2. Google's cloud will now scan web apps for common security flaws
  3. Lenovo slapped with lawsuit over dangerous Superfish adware
  4. Snowden documentary, Citizenfour, wins Oscar
  5. Exploitation By Consent
  6. Lenovo Preinstalled Superfish Adware on Laptops – REACTIONS
  7. Quick! File your taxes before a hacker does it for you
  8. Lenovo apologizes over pre-installed tracking software
  9. The Great SIM Heist How Spies Stole the Keys to the Encryption Castle
  10. Norton Internet Security antivirus update 'borked Internet Explorer'
  11. Lenovo and Superfish? Don’t panic, you may not be affected
  12. Say What? Required contents of notice in data breach notifications
  13. Windows Defender now removes Superfish malware… if you’re lucky
  14. Microsoft, LastPass and others post solutions to handle Superfish
  15. ‘Yes, Your Car Wash Is On Facebook’
  16. US cyber-cops declare WAR on Superfish ad-spewing malware lurking in Lenovo laptops
  17. Spies Can Track You Just by Watching Your Phone’s Power Use
  18. Born in the NSA - spook spin-out Sqrrl now offers 'out of the box' security
  19. DDoS-for-Hire Services Cheap But Effective
  20. Massive SIM card encryption key hack gives US, UK spies access to billions of phones
  21. Check Point Acquires Stealth-mode Security Startup
  22. Feb18 Protecting Your Money: How Does PoS Malware Get In?
  23. Hacker puts words into wrestler’s mouth in WWE Twitter hack
  24. Major Adult Website Gets Hacked, Malicious Iframe Leads to Angler EK
  25. AOL Search Vulnerable to Reflected File Download Attacks
  26. How a 7-year-old girl hacked a public Wi-Fi network in 10 minutes
  27. HTTP 2.0 wins approval: Road to better encryption?
  28. Lenovo Superfish
  29. Microsoft's cybercrime fighting unit opens up fifth satellite center in Singapore
  30. Israel targeted by malware packaged with pornographic video
  31. Banking Malware VAWTRAK Now Uses Malicious Macros, Abuses Windows PowerShell
  32. Chips under the skin: Biohacking, the connected body is 'here to stay'
  33. Microsoft replaces patch that killed PowerPoint
  34. Windows 10 will let you say goodbye to passwords forever
  35. Square Enix Phishers Home In on Dragon Quest X Video Gamers
  36. How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last
  37. 10 tips to maintain an online presence in a privacy-hostile world
  38. Information disclosure flaw exposes Netgear wireless routers to attacks
  39. Hardening Firefox
  40. NSA malware found hiding in hard drives for almost 20 years
  41. Windows 10 Activation Programs: PUPs and Surveys
  42. Today, Microsoft was a participant at the United States White House Cybersecurity and
  43. Google Adds Grace Period to Disclosure Policy
  44. What do you mean, "Facebook is now text only"? - 60 Sec Security [VIDEO]
  45. BYOD: Better stay used to it
  46. Lack of CSPRNG Threatens WordPress Sites
  47. A Crypto Trick That Makes Software Nearly Impossible to Reverse-Engineer
  48. Week in review: Car hacking and hijacking, critical Windows flaws, and Forbes.com com
  49. How data privacy is turning into an Orwellian maze
  50. 16 million mobile devices infected by malware
  51. Microsoft, Google join forces to tackle antivirus false flags
  52. Report: Millions stolen from banks through sophisticated malware
  53. Patch Tuesday: KB3023607 Breaks Cisco AnyConnect, Here's a Fix
  54. Robot tweets "I seriously want to kill people", prompts police response
  55. Amazon “Notice: Ticket Number” Phish Seeks Card Details
  56. Reactions to White House Cybersecurity Information Sharing Initiative
  57. Patch Tuesday: Microsoft Removes KB2920732 that Breaks PowerPoint
  58. Fuel Station Skimmers: Primed at the Pump
  59. Privacy News of the Week. Verizon Wireless to allow ‘supercookie’ opt-out
  60. Connected homes can be easy targets for hackers, says cybersecurity firm
  61. Sexy Russian scammers would love to break your heart this Valentine’s Day
  62. Never mind, Samsung, GOOGLE will EAVESDROP as you browse on Chrome
  63. Minded Security launches 'agentless' bank security tool in UK
  64. Vulnerability Research and Disclosure: Evolving To Meet Targeted Attacks
  65. An unromantic truth: Survey shows people are hesitant to share their online passwords
  66. 'Revenge porn' to be made illegal in England and Wales
  67. Antivirus tools miss almost 70 percent of malware within the first hour
  68. Facebook bug could have DELETED EVERY SINGLE PHOTO
  69. PayPal Phishing Sophistication Growing
  70. Pwned in 7 seconds: Hackers use Flash and IE to target Forbes visitors
  71. February 2015 Office Update Release
  72. KRBTGT Account Password Reset Scripts now available for customers
  73. Scammers Are Using a Fake Version of AdwCleaner to Trick People
  74. Creaking Patch Tuesday’s Viability Rests with Quality, Speed
  75. Researchers bypass Windows security by changing 1 bit
  76. New agency to sniff out threats in cyberspace
  77. Connected Home Security Systems Easy to Hack: HP
  78. Ransomware authors streamline attacks, infections rise
  79. Safer Internet Day 2015: This year, “Do 1 (More) Thing” to stay safer online
  80. Monster IE Update Top Patch Tuesday Priority
  81. Forbes.com infected by hackers in campaign to spy on visitors-researchers
  82. Was SSL3 killed by a POODLE? Surveys says…Maybe!
  83. UK lags US in cyber insurance, study shows
  84. Fearing an FBI raid, researcher publishes 10 million passwords/usernames
  85. Microsoft Security Bulletin Summary for February 2015
  86. Your Samsung SmartTV Is Spying on You, Basically
  87. New spyware steals pictures and data from iOS devices
  88. New DYRE banking malware in the wild
  89. New Adware Found In Google Play Apps With Millions Of Downloads
  90. Detecting zero-day hack in one millisecond with 'power fingerprinting'
  91. Ransomware 2.0 'crypts website databases – until victims pay up
  92. Malicious ads on major sites compromise many computers
  93. Phishers, scammers pile into worried Anthem customers in FRAUD FRENZY
  94. How Tor Was Broken Into (And Why That Doesn't Matter)
  95. DDoS malware for Linux systems comes with sophisticated custom-built rootkit
  96. Get the Drop on…Dead Drops
  97. IE11 zero-day vulnerability hits Windows 7 and 8.1 users
  98. The Facts about Botnets
  99. More iCloud phishing: don't get sucked in
  100. Once-starving GnuPG crypto project gets a windfall. Now comes the hard part
  101. Panda Security restructures for growth
  102. Facebook's DeepFace facial recognition technology has human-like accuracy
  103. Gamers, beware of fake in-game communication apps
  104. BEDEP Malware Tied To Adobe Zero-Days
  105. UK cyber attacker faces jail for targeting public services sites
  106. GCHQ-NSA intelligence sharing unlawful
  107. ISIS Bans Apple iPhones, iPads, iPods In The Caliphate Due To Fears They're Being ...
  108. IT professional, hack thyself
  109. Universal XSS flaw in fully patched Microsoft Internet Explorer exposed
  110. Flash Player 16.0.0.305 Patches Zero-Day Vulnerability
  111. WebRTC in Firefox and Chrome Reveals IPs Behind VPN
  112. As Flash 0day exploits reach new level of meanness, what are users to do?
  113. Google redesigns security warnings after 70% of Chrome users ignore them
  114. Regin malware and NSA’s QWERTY tool exposed as part of the same platform
  115. Google announces ‘Vulnerability Research Grants’
  116. "Exploit This": Evaluating the exploit skills of malware groups
  117. Android Banking Trojan Is Controlled via SMS
  118. DNS Hijack in D-Link Routers, No Authentication Required
  119. Warning -- Microsoft's new iOS Outlook app is insecure
  120. Skype Chats Compromised Syrian Rebels: Researchers
  121. Cyber crime is a threat to global economy, says researcher
  122. Email scammers stole $215M from businesses in 14 months
  123. The GHOST in the machine - 60 Sec Security [VIDEO]
  124. DDoS attacks almost doubled in year: Akamai State of the Internet Security Report
  125. Hackers Compromise Business IM Service HipChat
  126. Safe Practices with Your Mobile Device
  127. New Variant of Dyre Trojan Spreads Upatre Malware via Microsoft Outlook
  128. (New) Security Advisory for Adobe Flash Player
  129. Future airports could become hi-tech pleasure domes
  130. Exploring Control Flow Guard in Windows 10
  131. Dating site Topface pays hacker who stole 20 million credentials
  132. Threatpost News Wrap, January 30, 2015
  133. US military explores ‘cognitive fingerprints’ as alternative to passwords
  134. Google to change UK privacy policy after regulatory pressure
  135. Facebook Malware Poses as Flash Update, Infects 110K Users
  136. Critical Ghost bug could haunt WordPress and PHP apps, too
  137. Jihadists Increasingly Wary of Internet, Experts Say
  138. The Internet of Dangerous Things
  139. Only fall of global firm will shake up cyber security
  140. WhatsApp Web has privacy holes that could expose user photos
  141. World’s most ‘NSA-proof’ phone vulnerable to simple SMS hack
  142. Who runs an anti-virus scan these days? Apparently almost nobody
  143. Google defends policy that leaves most Android devices unpatched
  144. Security of Home Surveillance Cameras
  145. Verizon Wireless placing ‘supercookies’ on customer devices
  146. Exploit Kits: A Fast Growing Threat
  147. AV-Comparatives Names Product of the Year for 2014
  148. Security Experts Unite to Rewrite Proposed Cyber Laws
  149. Low Hanging Fruit: Flash Player
  150. Bug in ultra secure BlackPhone let attackers decrypt texts, stalk users
  151. Flurry of cyberattacks causes concern for Davos elites at World Economic Forum
  152. QinetiQ hosts latest Cyber Security Challenge competition
  153. Maldrone: Malware which hijacks your personal drone
  154. Wireless device in two million cars wide open to hacking
  155. GHOST, a critical Linux security hole, is revealed
  156. The tooth gnashing you hear is from Flash users installing a new 0day patch
  157. Spreading the Disease and Selling the Cure
  158. Lizard Squad claims to have brought down both Facebook and Instagram
  159. Has The Antivirus Industry Gone Mad?!
  160. Microsoft Security Advisory 2755801
  161. Russian Dating Site Topface Hacked for 20 Million User Names
  162. SCADA programmers? It's time for security by default! 60 Sec Security [VIDEO]
  163. Malaysia Airlines website 'compromised' by hackers
  164. Davos Elites Warned About Catastrophic Cyberattacks
  165. Predictions for 2015
  166. Snowden, NSA face off over privacy at Harvard
  167. University of Buffalo study examines the psychology of phishing emails
  168. Apple readies fix for Thunderstrike bootkit exploit in next OS X release
  169. Psychological profile-based security - could it work?
  170. Which Antivirus Offers the Best Protection? AV-Test Reports
  171. Symantec data centre security software has security holes
  172. Internet attack could shut down US gas stations
  173. Blur Account Security: Part II
  174. Google drops three OS X 0days on Apple
  175. (NEW) Adobe Security Bulletin
  176. Attack for Flash 0day goes live in popular exploit kit
  177. VLC vulnerabilities exposed
  178. This tool makes it easier for thieves to empty bank accounts
  179. How a 7-year-old girl hacked a public Wi-Fi network in 10 minutes
  180. New Adobe Flash Zero-Day found in the Wild
  181. Oracle Critical Patch Update Advisory - January 2015
  182. Blur Account Security: Part I
  183. HealthCare.gov Leaks Health Info to Third Parties [AP]
  184. WhatsApp issues 24 hour ban for WhatsApp Plus users
  185. The worst passwords in the world -- is yours on the list?
  186. How Was Your Credit Card Stolen?
  187. CISOs in the Dark on State of Security Readiness: Cisco
  188. Cybercrime deterrence: 6 important steps
  189. A Week in Security
  190. A hacked DDoS-on-demand site offers a look into mind of “booter” users
  191. 1800+ Minecraft usernames and passwords leak online
  192. Microsoft's Use-After-Free Mitigations Can Be Bypassed: Researcher
  193. Microsoft's Outlook email service was under attack in China
  194. Views from around the globe: 2nd Annual Report on How Personal Technology is Changing
  195. Researcher tears apart a Android Password Manager App
  196. Guide on actionable information for security incident response
  197. Cyberjihadists attack thousands of French websites after Charlie Hebdo massacre
  198. Spying on citizens: It's not just for the NSA anymore
  199. Hackers could exploit security holes in Progressive Insurance Snapshot devices
  200. How dating app Grindr makes it easy to stalk 5 million gay men
  201. Hack on PS and Xbox attackers leaks DDoS customers’ plaintext passwords
  202. Lizard Squad’s DDoS Website Gets Hacked, Passwords Stored in Plain Text
  203. Adobe Phish Back in the Wild
  204. Google reveals two more unpatched Windows security bugs
  205. AV-TEST estimates 12 million new malware variants per month
  206. Teen Arrested in UK for Xbox, PlayStation Attacks
  207. Politicians and journalists stung by fake open Wi-Fi protest
  208. Typosquatting abuse of 500 most popular websites analyzed
  209. Need Some Espionage Done? Hackers Are for Hire Online
  210. Microsoft cracks personalisation without prying
  211. Security and Military Experts Fall For "Open" Wi-Fi
  212. New Variant of Carberp Trojan Discovered by Researchers
  213. Have your customers been pwned? Would you like to know?
  214. Release Notes | Flash Player® 16 AIR® 16
  215. “Mac Defender” Scare Used in Tech Support Scams Targeting Mac Owners
  216. Zombie cookie: The tracking cookie that you can’t kill
  217. Adobe Security Bulletin
  218. 4 Mega-Vulnerabilities Hiding in Plain Sight
  219. Beware of malware masquerading as Oracle security patches
  220. A $10 USB charger with built-in wireless keylogger means more security headaches
  221. Skeleton key malware gives attackers control of Windows AD controllers
  222. How to Tell Whether Your Windows PC is Using a Proxy Server
  223. 4 Steps to Mitigate 95% of Known Vulnerabilities
  224. Microsoft Patches Vulnerability Under Attack and Google-Disclosed Zero Day
  225. 'Skeleton Key' malware unlocks corporate networks
  226. January 2015 Updates
  227. United, American airlines account fraud highlights hacker focus on travel industry
  228. A Call for Better Coordinated Vulnerability Disclosure
  229. Popular Game Rental Site Issues Statement on Alleged “Fraudulent Payment Attempts”
  230. 8chan domain “seized” over allegations of “child abuse” content
  231. First Public Mac OS X Firmware Bootkit Unleashed
  232. Google stops providing updates for Android Jelly Bean and lower versions for Webview
  233. Is IT security stifling innovation and collaboration?
  234. Who’s Attacking Whom? Realtime Attack Trackers
  235. Fake email uses ISIS threat to distribute malicious attack
  236. 7 security mistakes people make with their mobile device
  237. "Dear Facebook, I DEMAND that you ignore my demands" - 60 Sec Security [VIDEO]
  238. Judge cites use of secure email Riseup as a potential terrorist indicator
  239. Win7 reaches milestone; prepare for its demise
  240. TorrentLocker Ransomware Hits ANZ Region
  241. Free antivirus scanners for Windows PCs
  242. Google Engineers Critical of Aviator Browser Security
  243. New Year, Old Problems: Large-Scale Dating Site Spam Run Hits Users
  244. Major malvertising campaign spreads Kovter Ad Fraud malware
  245. One Definitive Prediction For 2015
  246. Most Asus routers affected by hijack bug; exploit posted
  247. Fake CNN Twitter Feeds Spam Weight Loss Links
  248. Mobile Phones and Laptops vulnerable to hacking even when not connected to Internet
  249. NSA Director on Sony Hack: ‘The Entire World is Watching’
  250. Bitstamp reopens Bitcoin exchange, adds security precautions