: Computer Security News

Pages : 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22

  1. Skycure Hacked My iPhone To Prove They Can Protect It
  2. The New Age Of Anonymous Email: Why Do You Still Give Yours Out?
  3. You’re infected—if you want to see your data again, pay us $300 in Bitcoins
  4. Security education cuts both ways - why marketers need retraining too
  5. How to risk your job in 7 security mistakes
  6. Dirty Dozen spam sending nations - find where you finished in our Q3 SPAMPIONSHIP cha
  7. A prompt to save the world: new security features against malware in AutoCAD
  8. Hackers Reported Shifting Focus to Web Ports
  9. Cybersecurity where kids are concerned
  10. Webroot Proves 'Secure' Need Not Mean 'Slow'
  11. 10 Years of Patch Tuesdays. Where's the Cake?
  12. Hackers hit PR Newswire, data shows up alongside recently stolen Adobe code
  13. Hard numbers, chilling facts: What the government does with your data
  14. Why Would You Ever Need To Block Calls To Your Phone?
  15. Hackers use botnet to scrape Google for vulnerable sites
  16. Malwarebytes Anti-Malware Mobile has been released!
  17. McAfee Tanks Independent AV Test
  18. Oracle's Critical Patch Update includes 127 fixes, 51 alone for Java
  19. Is cybersecurity by fiat dead on arrival?
  20. 'Jump boxes' improve security, if you set them up right
  21. Phishing is for the birds
  22. Stealthy technique fingerprints smartphones by measuring users’ movements
  23. Security experts recommend safeguards with Chrome personal data store
  24. Yahoo to encrypt webmail sessions by default starting January
  25. Facebook's "Who can look up your timeline by name" privacy tool bites the dust
  26. Security Google Switches On Browser Spy Cam in Chrome
  27. Monday review - the hot 24 stories of the week
  28. Thousands of Sites Hacked Via vBulletin Hole
  29. Cyber-warriors, your country needs you: Governments hit by “shortage” of experts
  30. How your identity gets swiped even if you're careful
  31. Some D-Link routers contain “backdoor” which allows remote access, researcher warns
  32. Biggest data security threats come from inside, report says
  33. What Microsoft Didn't Say on Patch Tuesday
  34. Cryptolocker Ransomware: What You Need To Know
  35. Google May Feature You In An Ad With 'Shared Endorsements' (Unless You Opt-Out)
  36. Fake support phone calls could lead to identity theft
  37. Abusing data should be a felony
  38. Top sites (and maybe the NSA) track users with “device fingerprinting”
  39. Destructive malware "CryptoLocker" on the loose - here's what to do
  40. Microsoft supports continuing work toward a Do Not Track standard
  41. How to prevent sextortion threats via a compromised webcam
  42. Security tips for digital nomads
  43. Goodbye, tracking cookies? Don't celebrate just yet
  44. Adobe's source code was parked on hackers' unprotected server
  45. Internet Explorer 11 Blocker Toolkit
  46. Nordstrom Finds Cash Register Skimmers
  47. Tech Support Scams: Coming to a Mac near you
  48. Online safety is our shared responsibility
  49. Update: Skype being investigated over NSA spying links
  50. Redirect hides browser extension
  51. Cisco patches vulnerabilities in some security appliances, switches, and routers
  52. Google Chrome 'Fails to Protect Sensitive Personal Data'
  53. Security essentials: What is two-factor authentication?
  54. Microsoft Security Bulletin MS13-082 - Critical
  55. ‘Bulletproof’ Hoster Santrex Calls It Quits
  56. FYI > Update is available that enables you to delete outdated Windows updates.......
  57. Fake shopper scam recruits money mules
  58. Microsoft pays out its first $100,000 bug bounty
  59. Google to pay rewards for open-source code security fixes
  60. Fake shopper scam recruits money mules
  61. Our commitment to Microsoft antimalware
  62. Malicious Software Removal Tool (MSRT) October 2013 – Shiotob
  63. 3 essential techniques to protect your online privacy
  64. Vulnerability in Microsoft Antimalware Client Could Allow Elevation of Privilege
  65. Patch Tuesday brings crucial IE fix
  66. Hijacking of AV firms’ websites may be linked to hack on Network Solutions
  67. Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2885084)
  68. Blackhole exploit kit author reportedly arrested, changes already noticeable
  69. Phone charger can place user on malware alert
  70. Security updates available for Adobe Reader and Acrobat
  71. Microsoft pays out $28K to IE bug hunters in its first-ever bounty program
  72. 5 Wi-Fi security myths you must abandon now
  73. Updated! Microsoft Security Bulletin Summary for October 2013
  74. Malwarebytes puts antivirus cleanup program on a USB stick
  75. Beware: Your browsing habits expose privacy preferences
  76. Failure to patch leaves many WordPress sites vulnerable
  77. Who goes there? Voice-recognizing biometrics are set to take off, ...Who goes there?
  78. 7 top tactics of hack attacks
  79. Microsoft Patch Tuesday - get ready for a bumper Tenth Birthday edition!
  80. Breaking bad: Drugs, bots, hackers, and cyber insecurity
  81. NSA using Firefox flaw to snoop on Tor users
  82. The Tor teardown, brought to you by goats, giraffes, and Thor's hammer
  83. Silk Road bust, Adobe breach and Lavabit chutzpah - 60 Sec Security [VIDEO]
  84. Get Cyber Safe
  85. Cheeky Lavabit *did* hand over crypto keys to US government after all ...
  86. Goodbye Microsoft Security Essentials: Microsoft Now Recommends You Use a Third-Party
  87. ZXX: Privacy font
  88. McAfee reveals sharp rise in malware signed with legitimate digital certificates
  89. 'Anonymous attackers' in court over cyber-attacks
  90. New proof-of-concept tool detects stealthy malware hiding in graphics cards
  91. Adobe Servers Hacked, 2.9 Million Customers Affected
  92. Here be dragons: Explorer “in dangerous territory” after public IE exploit release?
  93. Microsoft Security Bulletin Advance Notification for October 2013
  94. Facebook Graph Search can now paw through your posts and status updates
  95. Bitcoin Talk forum hacked hours after making cameo in Silk Road takedown
  96. Privacy xkcd: what’s your personality type?
  97. Yahoo offers its first tepid bug bounty
  98. State-backed hackers: You think you're so mysterious, but you're really not – report
  99. Silent Circle: NIST encryption standards untrustworthy
  100. It’s National Cyber Security Awareness Month! So be aware of an IE 0-Day!
  101. 10 encryption tips for the enterprise
  102. Symantec takes on one of largest botnets in history
  103. SophosLabs prepares for great showing at Virus Bulletin 2013
  104. Getting warmer? New Hotspot 2.0 “could offer safer public Wi-Fi”
  105. Hackers just POURING through unpatched Internet Explorer zero-day hole
  106. Brute-force malware targets email and FTP servers
  107. Forget fingerprints: Your iris is your new identity
  108. Hidden click fraud botnet uncovered
  109. Former Microsoft privacy adviser: 'I don't trust Microsoft now'
  110. British teen accused of massive Spamhaus DDoS attack arrested months ago
  111. WordPress sites stick with vulnerable versions despite worrying rise in attacks
  112. “One click, then boom”: Spear-phishing could “black out” energy companies........
  113. In computers, are random numbers really random?
  114. Java called favorite target for hack attacks this year
  115. Microsoft releases latest Law Enforcement Requests Report - no Skype content...
  116. Hackers target social media, step up mobile attacks
  117. Microsoft’s copyright bots ask Google to hide Microsoft.com links
  118. Copying fingerprints, Firefox trusted, Facebook not, Yahoo recycles - 60 Sec Security
  119. IE zero-day vulnerability exploited more widely than previously thought
  120. Microsoft received 37,000 end-user data requests in first half of year
  121. SIM card hacker: Bug is either 'a backdoor, gross negligence, or both'
  122. Spear-phishing is “super-strain” of bacteria threatening business, investor warns
  123. Walk this way! Forget fingerprints – could our daily habits be the passwords.........
  124. MS Malware Protection Center. Mevade and Sefnit: Stealthy click fraud
  125. French could serve up fines to Google for privacy violation
  126. Evaluating our protection performance and capabilities
  127. For hire: Elite “cyber mercenaries” adept at infecting Windows and Macs
  128. Malicious browser extensions pose a serious threat and defenses are lacking
  129. Thousands of Wordpress blogs compromised to perform DDOS attack
  130. Future cyber attacks could attack medical implants – or wage “psychological war” in v
  131. Rogue iMessage Chat Client Found in Play Store
  132. Microsoft: Security Essentials provides "baseline" protection
  133. End of support for Java SE 6
  134. Win32/Napolar – A new bot on the block
  135. Vanishing rights: stop your online privacy from disappearing
  136. Oracle: We're getting Java security under control
  137. Hacker video shows how to thwart Apple's Touch ID
  138. UK's Get Safe Online? 'No one cares' - run the blockbuster ads instead
  139. Identity theft service planted botnets in LexisNexis, other data providers
  140. Ransomware criminals attack SMEs using strong file encryption, ESET warns
  141. California gives teens an 'eraser button' to hide online skeletons
  142. Yahoo recycled ID users warn of security risk
  143. SkyDrive stumbles, becomes latest cloud app to get glitchy
  144. 'Watering holes' join Java as a major threat to corporate security, says F-Secure
  145. What story do your emails tell about you?
  146. How I hacked SIM cards with a single text - and the networks DON'T CARE
  147. Firefox burns Chrome in our trustworthy browser poll
  148. Internet Explorer Security Flaw Impacting Business Users
  149. Java updates too much of a bother? Maybe online banking's just not for you
  150. New OS X Trojan found and blocked by Apple's XProtect
  151. LinkedIn denies harvesting user email accounts without permission
  152. Banking (Apps) on Google’s Android
  153. Cybercriminals trying new tactics, security body warns ...
  154. Symantec identifes 'Hidden Lynx' as hackers co-op
  155. Can’t keep a bad man down: “Shylock” Trojan returns to attack U.S. banks
  156. Bank robbers pose as IT guys, rig device to slurp £1.3m from Barclays
  157. How Secure Is My Password: The Ultimate Litmus Test
  158. Win Bitcoins, booze and cash! Be the first to crack the iPhone's Touch ID fingerprint
  159. European Commission calls for single privacy law in wake of PRISM snooping
  160. Facebook "Likes" gain constitutional protection for US employees
  161. Patch Monday: A way to avoid more Microsoft Automatic Update fiascos
  162. LinkedIn users sue over service's "hacking" of contacts and spammy ways
  163. How To Make Your Entire Internet Life More Secure In One Day
  164. Defending against web-based malware: Spot the smoke, don't wait for fire
  165. For your security, please email your credit card and driver’s license ...
  166. 'Kissing couple' Trojan sent to slurp fanbois' data...
  167. What Pinterest’s decision to support Do Not Track means for users (and nonusers)
  168. Ahoy, me hearties! Check your almanacks, for today be Talk Like a Pirate Day, arrr!
  169. Microsoft Security Bulletin MS13-023 - Critical
  170. Ransomware Puts Your System To Work Mining Bitcoins
  171. Revoyem Ransomware Sinks to New Low
  172. Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone
  173. Security researchers create undetectable hardware trojans
  174. Surreptitiously Tampering with Computer Chips
  175. Fake card reader “texts” PINs to thieves instantly – and drains bank accounts...
  176. Why You Don’t Need an Outbound Firewall On Your Laptop or Desktop PC
  177. Hacktivism Long passwords are good, but too much length can be a DoS hazard
  178. Meet Hidden Lynx: The most elite hacker crew you’ve never heard of
  179. Security Advisories for Firefox
  180. Microsoft Security Advisory (2887505) Vulnerability in Internet Explorer...
  181. Researchers find new, ultra-low-level method of hacking CPUs...
  182. NIST cybersecurity framework: Your insurance company is watching
  183. NSA snoops on credit card transactions, says report
  184. WHOIS Privacy Plan Draws Fire
  185. Remote Desktop (RDP) Hacking 101: I can see your desktop from here!
  186. How to find out what the data miners know about you
  187. It's about time: Java update includes tool for blocking drive-by exploits
  188. Microsoft's swipe'n'swirl pic passwords LESS secure than PINs, warn researchers
  189. Shame on you! Report shows users lazier than ever about security practices
  190. Tibet-targeting Mac OS malware rears its head again
  191. Microsoft reissues September patches after user complaints
  192. Companies that allow home working “ignore security risks”, report claims
  193. The end? “Passwords are done,” says Google security chief
  194. Dropbox takes a peek at files
  195. Phishing warning after Vodafone hack leaks personal information...
  196. The iPhone 5s fingerprint reader: what you need to know
  197. Firefox Android zero-day allows execution of malicious code
  198. A scam-spotters guide: Ten things your bank will NEVER do – but cybercriminals will
  199. Uncovering an Android botnet involved in SMS fraud
  200. Microsoft confirms stability fixes messed up Outlook 2013
  201. Microsoft botches still more patches in latest Automatic Update
  202. IPhone jailbreakers begin cracking their knuckles over iOS 7
  203. Multiple Oracle and Adobe Product Security Updates are Available – Update Now
  204. Update for Outlook 2013 breaks folder pane
  205. Biz bods STILL don't patch hacker's delight Java and Flash
  206. Microsoft Malicious Software Removal Tool (MSRT) September 2013 - Win32/Simda
  207. Four out of five people are “locked out” of websites due to lost passwords
  208. MaskMe Is Now Your Worldwide Call Blocker: Introducing International Masked Phones
  209. Of course NSA can crack crypto. Anyone can. The question is, how much?
  210. Anatomy of a phish - a "generic mass targeted attack" against WordPress admins
  211. Why should you trust Google, Facebook more than the NSA?
  212. Yahoo: More than 12,000 US data requests led to disclosures more than 11,000 times
  213. Trust no one, advises security expert after NSA revelations
  214. Spooks break most Internet crypto, but how?
  215. Half of Internet users worry over personal info exposed online
  216. Google speeding up end-to-end crypto between data centers worldwide
  217. ‘SBC’ botnet to blame for Tor traffic surge?
  218. Password Generator Magic: Don’t Take On A Difficult Job Alone
  219. Here's how to best secure your data now that the NSA can crack almost any encryption
  220. Microsoft to patch dangerous Outlook hack-by-preview bug next week
  221. Trendnet under fire from FTC over camera security flaws which let hackers spy...
  222. NetTraveler Variant Adds Java Exploits, Watering Hole Attacks to Bag of Tricks
  223. First case of Android Trojan spreading via mobile botnets discovered
  224. Advance Notification Service for September 2013 Security Bulletin Release
  225. “Rogue cellular devices” could allow attackers to block texts, intercept calls...
  226. Faces, gestures, heartbeats - how will the passwords of the future work?
  227. Lawyers report steep rise in employee data theft cases
  228. In a rush? Five two-minute tips to make yourself more secure right now
  229. Improve Your Facebook, Google & LinkedIn Privacy With AVG PrivacyFix
  230. Researchers: Oracle’s Java Security Fails
  231. Syrian Electronic Army Tries to Make Friends with U.S. Marine Corps
  232. Acxiom’s letting you see the data they have about you…kind of
  233. Selecting all PUPs
  234. Hesperbot – A New, Advanced Banking Trojan in the Wild
  235. The perfect security defense is right under our noses
  236. Database of illegal downloaders - are British ISPs to become the "music NSA"?
  237. Facebook spam “earning criminals $200m a year”, researchers claim
  238. The Murky Waters Of The Zero-Day Business
  239. Facebook flaw allowed hackers to delete posted photos
  240. Recipe for disaster? Four in ten “BYOD” owners use no security measures at all
  241. How Often Do You Review Online Privacy Settings?
  242. Even suspicious email is too tempting to skip, survey finds
  243. Encryption: types of secure communication and storage
  244. Dropbox dismisses hack demonstrated by developers
  245. Trojan entices Craigslist users with fake software freebie
  246. Internet dating scam - mother and daughter crime duo jailed
  247. Organisations lack visibility on malware attacks, survey confirms
  248. Big phish, small pond: How to stay safe from SMS phishing scams
  249. Windows 8 picture passwords “can be cracked”, researchers warn
  250. More than 800,000 Facebook users fall victim to password-harvesting browser malware,