View Full Version : Security News

  1. Big data can be a big headache for data defenders
  2. Online security: your two-factor authorization checklist
  3. Take steps to secure what little online privacy you still have
  4. Fake "New incoming fax" notification carries malware
  5. SANS 2013 Forensics Survey -, (Thu, Apr 25th)
  6. Travelers to Israel can get their emails searched on entry
  7. Another Do***ent Targeting Uyghur Mac Users
  8. Two-step authentication for Twitter accounts coming soon
  9. Ubuntu Server 13.04 released
  10. New professional certification for cloud security
  11. Ubuntu Server 13.04 released
  12. EU parliament committee votes against air passenger data sharing bill
  13. Twitter Plans Two-Step Authentication to Prevent Hacks
  14. Senator rips self-regulatory do-not-track efforts
  15. Mt. Gox delays plan to support virtual currency litecoin
  16. Vulnerable terminal servers could let bad guys hack stoplights, gas pumps
  17. Dutch DigiD e-signature system under DDoS attack
  18. Photos: Security BSides London 2013
  19. Cyber attacks on trust expose companies to millions in losses
  20. Adults taking online password security risks
  21. Secured privileged accounts reduce APT exposure
  22. Free tool to identify risks in secure shell environments
  23. CISPA Passage in U.S. House Sets Off Battle Over Info Sharing, Privacy
  24. Apple's Root Certs Include the DoD
  25. More malware discovered from drone cyberattacks
  26. Recently patched Java flaw already targeted in mass attacks, researchers say
  27. Infosec 2013: There is no such thing as information security risk
  28. Assess risk before you ascend to the cloud
  29. Interesting Credit Card transactions, are you seeing similar?, (Wed, Apr 24th)
  30. Alleged LulzSec leader arrested and charged in Australia
  31. Fake Facebook "account blocked" notice doing rounds
  32. UK govt gives money to SMEs for improving their cyber security
  33. CVE-2013-2423 Java Vulnerability Exploit ITW
  34. Checking the security of mobile apps
  35. FireEye finds Gh0stRAT cyberespionage campaigns continue
  36. AP Twitter hack prompts fresh look at cybersecurity needs
  37. Australia charges man claiming to be LulzSec leader
  38. Social engineering in penetration tests: 6 tips for ethical (and legal) use
  39. AP Twitter Hijacking Proves Need for Better Authentication, Encryption
  40. Microsoft re-releases 'Blue Screen of Death' patch
  41. AP's Twitter account hacked; false 'Obama injured' tweet sent
  42. Business students to get HP-designed technical course for cloud, mobile, security issues
  43. Amazon looks to move security appliances to the cloud, says CISO
  44. Is your company ready for a big data breach?
  45. The global nature of advanced cyber attacks
  46. Analysis of 5 million scans on 53 million hosts
  47. Hijacked AP Twitter account spreads fake news, fells Dow Jones
  48. File protection in the cloud with DigitalQuick
  49. Remote users expose companies to cybercrime
  50. Free Android mobile security app
  51. AP News Service Hacked, Fake Tweet Says White House Attacked
  52. Reddit was downed by record DDoS attack, motive is unknown
  53. Health Care Point-of-Sale Breaches a Rising Concern: Verizon
  54. Verizon Data Breach report has been released, (Tue, Apr 23rd)
  55. MS13-036 has been re-released, (Tue, Apr 23rd)
  56. Hadoop Poses a Big Data Security Risk: 10 Reasons Why
  57. Exploit for recently patched Java flaw added to CrimeBoss exploit kit
  58. Serious flaw present in latest Java Runtime Environment for desktops and servers, researchers say
  59. Malware hijacks Twitter accounts to send dangerous links
  60. Huawei: US market no longer focus for its carrier business
  61. Bogus ad network marks new twist on Android malware
  62. Reuters fires social media editor accused of collaborating with Anonymous
  63. Hactivistists Change Tactics From Data Breaches to Disruption: Verizon
  64. Review: Cloud storage and sharing with MediaFire
  65. CVE-2013-2423 Java Vulnerability Exploit ITW
  66. Cyber Attacks Growing More Sophisticated, Targeting IT Firms
  67. Researchers discover more BadNews on Google Play
  68. Boeing technology offers secure, efficient way to tie together business, industrial nets
  69. Botnets target social networks with spam
  70. New Microsoft campaign promotes privacy prowess
  71. Schmidt says Google Glass still a year away
  72. IDC: SAP and Oracle winners as software growth slows
  73. Why security is in denial about awareness
  74. BYOD Lawsuits Loom as Work Gets Personal
  75. Data thieves and their motives
  76. Financial malware hijacking Twitter accounts
  77. Wireless hack attacks target critical infrastructure
  78. Dangerous CSRF attacks up 132%
  79. The importance of crowd-sourced threat intelligence
  80. ForeScout and FireEye team for APT mitigation
  81. SafeNet releases first crypto hypervisor
  82. Microsoft's Security Intelligence Report (SIRv14) released, (Tue, Apr 23rd)
  83. Malwarebytes Revamps Definition Updates After False-Positive Misstep
  84. The fight for users' right to know what companies do with their data
  85. Germans fine Google for gathering personal data with Street View cars
  86. The dangers of CISPA
  87. 'Aurora' Cyber Attackers Were Really Running Counter-Intelligence
  88. 108,000+ account details of Sims players leaked
  89. Event: Black Hat USA 2013
  90. Event: ACSAC 2013
  91. Event: VizSec 2013
  92. Event: TrustED 2013
  93. Wired on Cyberwar. In 1996.
  94. World's largest bitcoin exchange under DDoS attack
  95. CyberReveal: A new approach to security intelligence
  96. Big data, analytics, and cloud drive software growth
  97. Reliance on passwords inhibits online business
  98. Security Manager's Journal: A little housecleaning
  99. Largest bitcoin exchange, Mt. Gox, 'throttles' trading to tame price swings
  100. Our Internet privacy is at risk -- but not dead (yet)
  101. The age of information highway robbery
  102. Qualys and FireMon enable real-time network risk visibility
  103. Week in review: WordPress sites under attack, Android Trojan downloaded by millions, pass-thought s instead of passwords
  104. New Version of Sendmail v8.14.7 is available for download:, (Sun, Apr 21st)
  105. A Chargen-based DDoS? Chargen is still a thing?, (Sun, Apr 21st)
  106. 10 tips to secure funding for a security program
  107. Large Botnets Exploit Boston Marathon Bombing, Texas Factory Explosion
  108. Top-End DDoS Attack Bandwidth Surges Sevenfold: Report
  109. Java 8 release schedule delayed for renewed focus on security, (Fri, Apr 19th)
  110. How to track a lost computer with Find My Mac
  111. Former LulzSec member gets prison sentence for Sony Pictures hack
  112. Aegis Bio 3.0 hard drive ideal for security conscious users
  113. New version of Gozi financial malware bundles MBR rootkit
  114. Nimble spammers exploit Boston bombings, Texas disaster
  115. Browsers pose the greatest threat to enterprise, Microsoft reports
  116. New Android Trojan downloaded from Google Play by millions
  117. DLP suite for companies with limited IT support resources
  118. Russian malware mines bitcoins through botnet
  119. Brainwaves as passwords a boon for wearable computing
  120. Assange to Google's Schmidt: 'I don't use email'
  121. Sony Pictures LulzSec hacker sentenced
  122. Cloud-based email threat protection from Dell
  123. Research reveals damage that privacy breaches can cause
  124. Unlocking MS Office 2007/2010 do***ents
  125. Microsoft releases 4 of Enhanced Mitigation Experience Toolkit (EMET), More here:, (Thu, Apr 18th)
  126. House approves CISPA over privacy objections
  127. Widely used routers easy to hack even by remote attackers
  128. Cyber-Security Needs Spur Job Growth in 10 Tech Industries
  129. Researchers find malware targeting online stock trading software
  130. Failed authentication frequently thwarts online shoppers
  131. Novell's new Filr software offers secure alternative to Dropbox
  132. Microsoft rolls out optional two-step authentication
  133. Encrypted e-mail service from Silent Circle
  134. Free endpoint backup for small teams
  135. Microsoft moves to optional two-factor authentication
  136. US House moves toward passage of CISPA
  137. Gift card SMS spam drops after FTC action, Cloudmark finds
  138. Popular home routers contain critical security vulnerabilities
  139. Beware of fake SourceForge site offering malicious downloads
  140. Backdoor Trojan uses "magic code" to contact C&C server
  141. How financial institutions can overcome the cloud security barrier
  142. IT decision makers mark increase in security-related incidents
  143. Most corporate computers missing critical software updates
  144. AlienVault releases USM virtual appliance
  145. Microsoft Says Worm Infections Declining, But Web Attacks Rising
  146. AlienVault Virtual Appliance Detects Threats, Assesses Vulnerabilities
  147. Boston bombings: Forensics on crowdsourced video will be a challenge
  148. CISPA sponsor compares opponents to 14-year-olds
  149. Apple keeps patching Java on OS X Snow Leopard after proposed drop-dead date
  150. DDOS attacks have increased in number and size this year, report says
  151. Employers in denial about insider threat to data security
  152. Average DDoS attack bandwidth up 718 percent
  153. Pirate Bay co-founder charged with hacking Swedish bank, agencies
  154. Boston-Related Malware Campaigns Have Begun, (Wed, Apr 17th)
  155. Android Mobile Devices the Target of ACLU Complaint to FTC
  156. Spamhaus-themed ransomware delivered through exploit kits
  157. ACLU complains to FTC that mobile carriers leave Android phones unsecured
  158. Investigators comb social nets to look for bombing clues
  159. Startup Armor5 debuts with cloud-based security for mobile devices
  160. White House threatens to veto CISPA ahead of vote
  161. Java 7 Update 21 to fix bugs, change applet warning messages
  162. AVG releases free 'TuneUp' application for Android devices
  163. News of Boston Marathon bombings used to spread malware
  164. Oracle plugs a host of critical Java vulnerabilities
  165. A guide to negotiating and assuring cloud services
  166. Insider threats and BYOD still a great problem
  167. Big data drives big demand for storage
  168. Apple iTunes Services Outage, (Wed, Apr 17th)
  169. Pirate Party on data protection
  170. UnboundID unveils Privacy Suite
  171. Cyber-Attackers Focus on Small Businesses, Web-Based Malware: Symantec
  172. Java 7 Update 21 is available - Watch for Behaviour Changes !, (Tue, Apr 16th)
  173. Malware Attacks Growing, Getting Smarter, Targeting Android: Report
  174. Hacker in court for DDoS attacks on Oxford and Cambridge Universities
  175. Tactics of WordPress attackers similar to bank assaults
  176. How to enable Family Safety features in Windows 8
  177. Military academies take on NSA in cybersecurity competition
  178. Oracle shipping 128 patches for apps, database and middleware
  179. How hacking fixed the worst video game of all time
  180. Pirate Bay co-founder charged with hacking IBM mainframes, stealing money
  181. Fake Boston Marathon Scams Update, (Tue, Apr 16th)
  182. Targeted attacks hitting small business have increased threefold
  183. Linode hackers say they will release stolen customer data
  184. GE's 'Industrial Internet' Bolsters Critical Infrastructure Security
  185. 90% of game hacks and cracks contain malware
  186. Most enterprises encounter problems with open source software
  187. First anti-malware product for UEFI
  188. Most security pros believe they will suffer a data breach
  189. Symantec report finds small businesses battered by cybercrime
  190. Microsoft eyes ditching browser for secure Web apps
  191. 4 Mobile Security Predictions to Help CIOs Plan for the Future
  192. US House to vote on CISPA cyberthreat bill this week
  193. Video: Boston Marathon explosion
  194. 2.4M cards compromised in US supermarket chain breach
  195. Pass-thoughts as a solution to the password problem
  196. Pass-thoughts as a solution to the password problem
  197. Radware unveils SDN strategy
  198. Disruptive tech trends that will change everything
  199. Study of the European data center market
  200. Big Data: Huge risk or huge opportunity?
  201. WordPress Sites Under Massive Password-Guessing Attack
  202. Please send any spam (full headers), URLs or other suspicious content scamming off Boston Marathon explosions to, (Mon, Apr 15th)
  203. Find My Mac both useful and frustrating for law enforcement
  204. WordPress sites targeted by mass brute-force attack
  205. A closer look at Hack In The Box 2013 Amsterdam
  206. Cloud-Based IT Security Services to Increase Through 2015: Gartner
  207. GE's 'Industrial Internet' Bolsters Critical Infrastructure Security
  208. Set your Google account to be deleted after you die
  209. Mobile malware up 163%
  210. Oops - You Mean That Deleted Server was a Certificate Authority?, (Mon, Apr 15th)
  211. Gambling software developer moves to fix poker game flaws
  212. John Kerry: Cyberdefense a major part of Asian security
  213. FAA and EASA say hijacking planes using an app is not possible
  214. Cyber-Criminals Putting Botnets to Work on Bitcoin Mining
  215. Cloud-based security services still in high demand
  216. TDoS: The latest wave of Denial of Service attacks
  217. Toomas Hendrik Ilves on Cybersecurity
  218. Week in review: Hijacking airplanes with an Android phone, and a call to arms for infosec professionals
  219. Employees admit to accessing or stealing private company information
  220. Real-world test of 21 antivirus products
  221. INTERPOL Chief on fighting cybercrime worldwide
  222. Protocol 61 Packets Follow Up, (Sun, Apr 14th)
  223. GE's 'Industrial Internet' Bolster's Critical Infrastructure Security
  224. Wide-scale attack against WordPress blogs reported
  225. Air Force reclassification of cyber tools as weapons sparks speculation
  226. Cyber-Criminal Putting Botnets to Work on Bitcoin Mining
  227. Protocol 61: Anybody got packets?, (Sat, Apr 13th)
  228. More massive malicious spam! This time claiming to be from Almacenes Exito, (Fri, Apr 12th)
  229. Microsoft Fixes Patch Tuesday Security Update After User Complaints
  230. IRS going against privacy tide on warrantless email search
  231. White House signals it won't support CISPA in present form
  232. Researchers find vulnerabilities in online poker applications
  233. Microsoft amends security update after reports of system errors
  234. Google lets users plan their digital afterlife
  235. Critics: CISPA still a government surveillance bill
  236. Google Death: Inactive account manager helps you plan digital last will and testament
  237. Twitter's recipe for security awareness
  238. Review: Nipper Studio: A new approach to security auditing
  239. Sophisticated threats and thinking like the attacker
  240. BirdStep updates SafeMove mobile VPN solution
  241. Sentinel Envelope ensures code integrity and app security
  242. Private file storage and sharing app from Gemalto
  243. Criminals May Be Switching to More Aggressive Scareware Scams
  244. Criminals May Be Switching to More Aggressive Scareware Scams
  245. Programming Languages Susceptible to Specific Security Flaws: Report
  246. Targeted social media attacks said to be underreported
  247. Two-factor authentication ready to roll out at Microsoft
  248. BYOD Gets Messy with AT&T Class Action Lawsuit
  249. Widely used wireless IP cameras open to hijacking over the Internet, researchers say
  250. Twitter OAuth feature can be abused to hijack accounts, researcher says