View Full Version : Security News

  1. Mozilla considers rejecting long-lived digital certificates following similar decision by Google
  2. PHP and VMWare Updates, (Fri, Aug 23rd)
  3. How encryption and tokenization help with cloud services adoption
  4. We Need To Talk, Google
  5. NASDAQ's Community Forum
  6. Android Malware goes SMTP
  7. Windows 8 shouldn't be used on government computers, say IT experts
  8. Mozilla 'Plug-n-Hack' project aims for tighter security tool integration
  9. Popular download management program has hidden DDoS component, researchers say
  10. Deep cyberattacks cause millions in losses for US banks
  11. Failed data feed system shutters Nasdaq trading
  12. Privacy groups criticize proposed $8.5 million Google settlement
  13. Popular Windows downloader has secret DDoS capability
  14. Fingerprint algorithm for Android devices
  15. Disaster recovery for public, private and hybrid clouds
  16. Read of the Week: A Fuzzy Future in Malware Research, (Thu, Aug 22nd)
  17. Chrome 29.0.1547.57 released, (Thu, Aug 22nd)
  18. Ruling shows NSA misled the FISC about data collection volume and scope
  19. Cisco patches serious vulnerabilities in Unified Communications Manager
  20. Latest NSA revelations could help pending lawsuits
  21. FISA Judge: NSA misrepresented themselves, violated the Constitution
  22. Review: Simple Steps to Data Encryption
  23. Banks risk shattering customer trust
  24. Mobile security management market to hit billion dollar mark
  25. Ransomware changes Windows login credentials
  26. ZeroAccess developers continue to innovate
  27. Manning attorney vows to fight on, urges Obama to issue pardon
  28. Poison Ivy, used in RSA SecurID attack, still popular
  29. The NSA collected data on tens of thousands of Americans
  30. NCP engineering adds elliptic curve cryptography to products
  31. SwiftKey Cloud: Backup and sync your writing style
  32. New enterprise information management platform
  33. Secure enterprise file sharing from SolarWinds
  34. Android Malware goes SMTP
  35. How the Snowden Effect Is Paralyzing CIOs
  36. 'League of Legends' account information and transaction records compromised
  37. Fibre Channel Reconnaissance - Reloaded, (Wed, Aug 21st)
  38. Psst. Your Browser Knows All Your Secrets., (Wed, Aug 21st)
  39. NSA surveillance system can listen to 75% of US Internet traffic
  40. Security tips for the connected family
  41. League of Legends user account, credit card info compromised in breach
  42. China arrests two for using the Internet to defame cultural icon
  43. Study finds big gap about app security between execs and IT staffers
  44. 'Instagram for PC' application is a marketing scam
  45. CSOs: Stop flogging the threats and start providing solutions
  46. 5 Reasons You Can Finally Ditch BlackBerry
  47. Apple Dev Center was hacked via remote code execution bug
  48. Miranda battles to have seized stuff back, Guardian details drive destruction
  49. Barracuda Web Filter 7.0 targets social media harassment
  50. The mobile cybercrime landscape is becoming more defined
  51. Analysis of Poison Ivy remote access tool
  52. Mobile cybercrime landscape is becoming more defined
  53. Rapid7 unveils analytics for security controls and user risk
  54. Veeam Backup & Replication 7 released
  55. Cyberattacks second most common cause of severe EU wired Internet outages in 2012
  56. Is evading an IP address block to access a website against the law?
  57. DHS cybersecurity appointment seen as government-industry bridge
  58. The erosion of privacy in the digital world
  59. MitB malware targets steam
  60. Groklaw shuttered because email is no longer safe
  61. UK agents detain Greenwald's partner, destroy The Guardian's hard drives
  62. McAfee executive picked for top Homeland Security post
  63. The dangers of QR codes for security
  64. Why continuous IT cost optimization is essential
  65. Nmap 6.40 released
  66. EVault backup appliances now with cloud-connected software for failproof recovery
  67. ENISA analyzes major security incidents in the EU
  68. Microsoft re-releases MS13-066:, (Mon, Aug 19th)
  69. Chrome plugin aims to thwart user profiling efforts
  70. Scanning the Internet in less than an hour
  71. Google says it is not answerable in the UK in Safari cookies privacy suit
  72. Attackers use Ramnit malware to target Steam users
  73. How to Deploy IP Cameras in Your Small Business
  74. New Zeus variant creates bogus Instagram accounts
  75. Advanced threats to drive growth in new product segment
  76. LastPass bug leaks plain text passwords
  77. Business Risks and Cyber Attacks, (Mon, Aug 19th)
  78. Lavabit owner risks arrest for not complying with surveillance order
  79. "Jekyll" test attack sneaks through Apple App Store, wreaks havoc on iOS
  80. Lucrative business: cybercrime-as-a-service
  81. Running Snort on ESXi using the Distributed Switch, (Mon, Aug 19th)
  82. Manage security across multiple systems with Milan 3.0
  83. WebTitan Cloud: Web filtering service for SMBs
  84. Week in review: NSA privacy violations, key cloud computing trends, and building security culture
  85. Cloud market destined to change following NSA leaks
  86. U.S. Dept. of Energy reports second security breach
  87. Android now 'mobile world's equivalent' of Windows for hackers
  88. CVE-2013-2251 Apache Struts 2.X OGNL Vulnerability, (Fri, Aug 16th)
  89. Cybercriminals add new exploit for recently patched Java vulnerability to their arsenal
  90. Google's Invasions of Privacy, Free But Flawed Products Show Its Arrogance
  91. Firm found using browser plugins to inject unauthorized ads on YouTube
  92. There's no free lunch when it comes to Google's Gmail
  93. Syrian Electronic Army targets Washington Post, CNN, and Time
  94. Cisco's 4,000 job cuts won't touch new acquisition Sourcefire
  95. NSA internal audit reveals thousands of privacy violations
  96. Is the hybrid cloud the future for enterprises?
  97. Panda Security launches 2014 retail line
  98. Google delivers patch for Android SecureRandom implementation
  99. Turn any iOS device into a secure mobile payment solution
  100. Cross-platform Frutas RAT delivered via targeted emails
  101. Securing the modern web: Open sourcing the future of IAM
  102. Baby monitor hack highlights manufacturers' security shortfalls
  103. Where RFI attacks fall in the security threat landscape
  104. Imaging LUKS Encrypted Drives, (Wed, Aug 14th)
  105. What to expect with PCI DSS 3.0
  106. Blocking "MiniDuke" Type Threats Using Exploit Interception
  107. IBM to acquire endpoint security company Trusteer
  108. What to expect with PCI DSS 3.0
  109. Google patches Android after Bitcoin wallet issue
  110. Microsoft yanks troublesome Exchange security patch
  111. New York Post hit by pro-Assad hackers
  112. Hackers targeting servers running Apache Struts applications, researchers say
  113. Secure rugged Android tablet for the government
  114. Review: Practical Anonymity: Hiding in Plain Sight Online
  115. IBM acquires Trusteer
  116. Identify unknown internal email-enabled systems
  117. D-Link releases new network camera
  118. Druva delivers cloud-scalable backup to datacenters
  119. Microsoft Pulls MS013-061 due to problems with Exchange Server 2013
  120. ISC StormCast for Thursday, August 15th 2013
  121. Researchers explore underground market of Twitter spam and abuse
  122. NSA revelations a mixed bag for private clouds
  123. Cybercriminals use Google Cloud Messaging service to control malware on Android devices
  124. Joomla exploit doing rounds, users advised to update
  125. How to get sufficient funding for your security program (without having a major incident), (Wed, Aug 14th)
  126. Browlock Ransomware Targets New Countries
  127. Cyber crooks misuse Google service to control Android Trojans
  128. .GOV zones may not resolve due to DNSSEC problems., (Wed, Aug 14th)
  129. Google increases rewards in bug bounty program
  130. Microsoft Patch Tuesday: The Ping of Death returns, IPv6-style
  131. Hacker hijacks baby monitor camera, terrorizes family
  132. Microsoft moves to block MD5 certificates and improve RDP authentication
  133. China-based intruders use fresh attack techniques against dissidents
  134. Bitcoin wallets upgraded after Android cryptography problem
  135. Free Android anti-virus for mobile devices
  136. Sweeping mobile phishing attack requests bank customers' ID scans
  137. Java - The Gift That Keeps On Giving
  138. Skyhigh Secure: Data security for information in the cloud
  139. Dear CSO, do you know how to build security culture?
  140. Kaspersky updates its security solutions for home users
  141. MS SQL Agent facilitates the collection of MSSQL audit records
  142. Intigua: Automate the provisioning of management technologies
  143. ISC StormCast (Wed, Aug 14th)
  144. Microsoft security advisories: RDP and MD5 deprecation in Microsoft root certificates, (Tue, Aug 13th)
  145. Malware taps mobile ad network to siphon money
  146. Microsoft releases critical fixes for IE and Exchange Server
  147. Larry Ellison: Some government surveillance is 'essential' to fight terror
  148. More Android malware distributed through mobile ad networks
  149. No, your data isn't secure in the cloud
  150. Malicious ads lead to outdated adware-laden Firefox "update"
  151. Multi-service authentication via palm vein images
  152. Google increases rewards for Chromium bug reports
  153. Hacking a smart lightbulb system
  154. Windows XP's approaching retirement will be boon for blackhats
  155. Are There Good Hackers?
  156. Intelligence chief Clapper to set up US surveillance review group
  157. Joomla patches file manager vulnerability responsible for hijacked websites
  158. China-based intruders use fresh attack techniques against dissidents
  159. Obama's "independent" intelligence review group selected by DNI Clapper
  160. Exploring critical infrastructure security and government cyber security
  161. Most government CIO budgets flat or increasing in 2013
  162. How much confidential info is left unprotected in SharePoint?
  163. ISC StormCast for Tuesday, August 13th 2013 (Tue, Aug 13th)
  164. Mega plans to offer encrypted email service
  165. How security smart is Generation Y?
  166. Chinese hacker group behind New York Times attack returns with updated tools
  167. New privacy tools foils spam with fake email addresses
  168. Android security flaw puts Bitcoin users at risk
  169. Protect against threats targeting Android
  170. Obama defends surveillance programs, promises more oversight
  171. Fortinet expands secure application delivery product portfolio
  172. The Pirate Bay releases censorship-thwarting browser
  173. Pirate Bay introduces Web browser to elude censorship
  174. Bitcoin wallets on Android at risk of theft, developers say
  175. Can biometrics revolutionize mobile payment security?
  176. Blaster - 3654 Days Later
  177. Adoption of antivirus software on mobile devices remains low
  178. Key cloud computing trends and enterprise security
  179. Week in review: Tor users targeted with spyware, secure mail providers close up shop
  180. ISC StormCast for Monday, August 12th 2013 (Mon, Aug 12th)
  181. Arbor's Fort Disco botnet has a hit list of more than 400,000 domains
  182. Microsoft slams Gmail's 'Gspam' in latest Scroogled attack ad
  183. U.S. openness, restraint could lessen fallout from NSA surveillance
  184. Obama says spying hit U.S. reputation, and he plans a fix
  185. Obama calls for review of surveillance programs
  186. Samba Security Update Release, (Sat, Aug 10th)
  187. HP Switches? You may want to look at patching them. , (Fri, Aug 9th)
  188. Black Tuesday advanced notification , (Fri, Aug 9th)
  189. Snowden revelations may cost U.S. cloud providers billions, says study
  190. Chrome's password security insanity can be cured
  191. Zscaler finds a 'big number' of Google Play apps with overly aggressive adware
  192. NSA sysadmins to be replaced with computers
  193. More apps exploiting Android "Master Key" bug found
  194. Beware of bogus Facebook account hack tool offer
  195. Secure mail providers close up shop to prevent govt spying
  196. How IT Can Scare Off BYOD Monsters in the Closet
  197. Cybersecurity Pros in High Demand, Highly Paid and Highly Selective
  198. xkcd: The Mother of All Suspicious Files
  199. Encrypted Communications Service Goes Silent
  200. Free annual MIT security conference expands beyond Kerberos
  201. 'Western Express' credit-card fraud prosecution ends
  202. Snowden's email provider, Lavabit, shutters citing legal pressure
  203. After Lavabit, Silent Circle also shuts down email service
  204. Microsoft to release three critical fixes
  205. Netwrix updates its configuration auditing software
  206. Organizations ignore social media when it comes to business continuity planning
  207. Reveton changes tack, relies on fake AV
  208. Facebook rolls out Graph Search for English speaking users
  209. Linux banking Trojan offered for sale
  210. Chrome not the only browser that stores plain-text passwords
  211. Security intelligence through configuration auditing
  212. Facebook launches Graph Search to all English-speaking users, acknowledges privacy concerns
  213. Hands-on: Android device manager confirms that, yes, Google really is watching
  214. White House considers incentives for cybersecurity
  215. Compliance no longer main driver of security measures
  216. Defending against the BREACH attack
  217. Review: Black Code: Inside the Battle for Cyberspace
  218. Silent Text for Android now on Google Play
  219. Free tool for auditing Google Apps
  220. Experienced employees more important than a rising security budget
  221. DNS servers hijacked in the Netherlands, (Wed, Aug 7th)
  222. Analyzing the Fort Disco bruteforce campaign
  223. 6 Ways Employees Are Putting Your Company's Data at Risk
  224. Hacked business domains used to host child abuse images
  225. Most companies don't have data breach cyber insurance
  226. Compromising Google Accounts and enterprises via flaw in Android SSO
  227. Twitter turns to app-based two-factor authentication
  228. IOActive launches security intelligence service
  229. Expect more Android security issues in 2013
  230. Researchers create DIY IDS for identifying hacked smartphones
  231. Windows phones can be burned by rogue hotspots
  232. US agencies explore cybersecurity incentives for the private sector
  233. Digital stakeout of Chinese hacker gang reveals 100+ victims
  234. Bradley Manning's maximum sentence reduced by a third
  235. On Fake "F-Secure Security Pack" Malicious Browser Extension
  236. Are Apple developers on the hacker hit list?
  237. ESET Mobile Security for Android gets an update
  238. Dependability through Assuredness Standard released
  239. Cloud contracts need transparency to improve risk management
  240. PuTTY 0.63 released: 4 security updates
  241. ISC StormCast for Tuesday, August 6th 2013
  242. Mozilla releases Firefox v 23.0 and Thunderbird v 17.0.8 to address security vulnerabilities, (Tue, Aug 6th)
  243. Researchers create DIY IDS for identifying hacked smartphones
  244. Spy agencies want low-energy system to solve 'interesting problems'
  245. 5 Things PRISM Teaches CIOs About Doing Business in Today's World
  246. Smartphones could evolve into password killers
  247. NSA tips off law enforcement, asks them to keep the practice secret
  248. German Minister calls for punishment of US companies involved in NSA spying
  249. OpenX Ad Server Backdoor, (Tue, Aug 6th)
  250. Advice on Tor use in wake of Freedom Hosting compromise