View Full Version : Security News



  1. Snowden's email provider, Lavabit, shutters citing legal pressure
  2. After Lavabit, Silent Circle also shuts down email service
  3. Microsoft to release three critical fixes
  4. Netwrix updates its configuration auditing software
  5. Organizations ignore social media when it comes to business continuity planning
  6. Reveton changes tack, relies on fake AV
  7. Facebook rolls out Graph Search for English speaking users
  8. Linux banking Trojan offered for sale
  9. Chrome not the only browser that stores plain-text passwords
  10. Security intelligence through configuration auditing
  11. Facebook launches Graph Search to all English-speaking users, acknowledges privacy concerns
  12. Hands-on: Android device manager confirms that, yes, Google really is watching
  13. White House considers incentives for cybersecurity
  14. Compliance no longer main driver of security measures
  15. Defending against the BREACH attack
  16. Review: Black Code: Inside the Battle for Cyberspace
  17. Silent Text for Android now on Google Play
  18. Free tool for auditing Google Apps
  19. Experienced employees more important than a rising security budget
  20. DNS servers hijacked in the Netherlands, (Wed, Aug 7th)
  21. Analyzing the Fort Disco bruteforce campaign
  22. 6 Ways Employees Are Putting Your Company's Data at Risk
  23. Hacked business domains used to host child abuse images
  24. Most companies don't have data breach cyber insurance
  25. Compromising Google Accounts and enterprises via flaw in Android SSO
  26. Twitter turns to app-based two-factor authentication
  27. IOActive launches security intelligence service
  28. Expect more Android security issues in 2013
  29. Researchers create DIY IDS for identifying hacked smartphones
  30. Windows phones can be burned by rogue hotspots
  31. US agencies explore cybersecurity incentives for the private sector
  32. Digital stakeout of Chinese hacker gang reveals 100+ victims
  33. Bradley Manning's maximum sentence reduced by a third
  34. On Fake "F-Secure Security Pack" Malicious Browser Extension
  35. Are Apple developers on the hacker hit list?
  36. ESET Mobile Security for Android gets an update
  37. Dependability through Assuredness Standard released
  38. Cloud contracts need transparency to improve risk management
  39. PuTTY 0.63 released: 4 security updates
  40. ISC StormCast for Tuesday, August 6th 2013
  41. Mozilla releases Firefox v 23.0 and Thunderbird v 17.0.8 to address security vulnerabilities, (Tue, Aug 6th)
  42. Researchers create DIY IDS for identifying hacked smartphones
  43. Spy agencies want low-energy system to solve 'interesting problems'
  44. 5 Things PRISM Teaches CIOs About Doing Business in Today's World
  45. Smartphones could evolve into password killers
  46. NSA tips off law enforcement, asks them to keep the practice secret
  47. German Minister calls for punishment of US companies involved in NSA spying
  48. OpenX Ad Server Backdoor, (Tue, Aug 6th)
  49. Advice on Tor use in wake of Freedom Hosting compromise
  50. Malware fighter FireEye files for $175M IPO
  51. TOR Project: Stop using Windows, disable JavaScript
  52. Are Apple developers on the hacker hit list?
  53. Top destinations for cyber security pros
  54. Enterprises in denial regarding network security
  55. Attackers are taking advantage of old vulnerabilities
  56. Decoy water plant attracts hackers, Chinese APT1 crew
  57. ISC StormCast for Tuesday, August 6th 2013
  58. Researcher builds botnet-powered distributed file storage system using JavaScript
  59. DEF CON attendees demonstrate social engineering prowess in CTF contest
  60. Cross-platform backdoor created with RAT available online
  61. Working as an ethical hacker
  62. DMARC: another step forward in the fight against phishing?, (Mon, Aug 5th)
  63. Twitter introduces 'in-tweet' abuse button after complaints
  64. Hidden websites fall offline following arrest in Ireland
  65. Will Smith makes unexpected appearance at Defcon hacker conference
  66. Android one-click Google authentication method puts users, businesses at risk
  67. Event: RSA Conference Europe 2013
  68. Tor users targeted with spyware following anonymous Web-host shutdown
  69. xkcd: The Mother of All Suspicious Files
  70. Week in review: iPhone charger, PLC, femtocells hacks, and the future of phishing
  71. Working as an ethical hacker
  72. Free ebook: Introducing Windows Server 2012 R2 Preview Release
  73. Cybercriminals are doing a better job than the companies they target
  74. Collaborative threat intelligence platform from ThreatConnect
  75. Russians responsible for 30% of mobile malware
  76. Researchers reveal methods behind car hack at Defcon
  77. What Anti-virus Program Is Right For You?, (Sat, Aug 3rd)
  78. Attackers turning to legit cloud services firms to plant malware
  79. Apple's 'walled garden' cracked by hacked charger
  80. FBI uses malware to spy on suspects via their phones
  81. Enterprises warned against first true Google phone, Moto X
  82. Fake American Express Alerts, (Fri, Aug 2nd)
  83. Engineers demonstrate PLC hack on mock oil rig
  84. Scans for Open File Uploads into CKEditor, (Fri, Aug 2nd)
  85. FBI announces cyberattack-reporting portal for private sector companies
  86. ZeroAcces rootkit dominates, adds new persistence techniques
  87. CISO spending priorities revealed
  88. Industrial control systems targeted by malicious attackers, research shows
  89. Researchers demo exploits that bypass Windows 8 Secure Boot
  90. Understanding incident response: 5 tips to make IR work for you
  91. Techniques malware authors use to evade detection
  92. How to avoid digital dangers while traveling
  93. Real-time data analysis increases DDoS defenses
  94. Hacker expo and all-women keynote line coming to Hack In The Box
  95. Cybergangs alter infrastructure abuse techniques
  96. Self-encrypted 2.5" SATA SSD from Microsemi
  97. Protegrity expands enterprise big data protection capabilities
  98. Panda Security updates Cloud Office Protection
  99. Cisco Security Advisory: OSPF LSA Manipulation Vulnerability in Multiple Cisco Products http://tools.cisco.com/security/center/viewAlert.x?alertId=30210, (Fri, Aug 2nd)
  100. VMware Security Advisory VMSA-2013-0009 - http://www.vmware.com/security/advisories/VMSA-2013-0009.html, (Fri, Aug 2nd)
  101. Researchers hack femtocells, record mobile phones' calls, SMS traffic
  102. Snowden said to leave Moscow airport as Russia grants him asylum for a year
  103. Gartner: SaaS contract language regarding security is lacking
  104. Researchers exploit cellular tech flaws to intercept phone calls
  105. Email from social media safest, financial services riskiest
  106. Next iPhone's possible fingerprint reader unlikely to excite buyers
  107. NSA chief to Black Hat on surveillance: Don?t believe press reports
  108. How to roll your own VPN
  109. Snowden given asylum by Russia, leaves Moscow airport
  110. How To: Setting Up Google's Two-Factor Authentication In Linux, (Thu, Aug 1st)
  111. Free first aid kit for computer viruses
  112. Vulnerabilities in D-Link network video recorders enable remote spying, researcher says
  113. Controls keep NSA spy programs legal, director tells Black Hat audience
  114. Senators push for changes in NSA data collection
  115. Researchers show ways to bypass home and office security systems
  116. Senators Push to Curb NSA's FISA Authorities
  117. Facebook turns on secure browsing by default
  118. Researchers demo how apps, chargers can circumvent Apple iPhone, iPad security
  119. All Facebook users get secure browsing by default
  120. Keep your laptop safe while using Wi-Fi hotspots
  121. Malware attacks via malicious iPhone chargers
  122. NSS Labs unveils Threat Modeling and Threat Forecasting
  123. Universities are putting private financial data at risk
  124. Automated remediation for APTs and 0-days
  125. HackShield bags prevent physical and digital intrusion
  126. Accuvant launches Threat Intelligence Briefing service
  127. McAfee Mobile Security offers enhanced privacy protection
  128. McAfee Artemis/GTI File Reputation False Positive, (Wed, Jul 31st)
  129. New leaks say NSA can see all your online activities
  130. Microsoft gets kudos for MAPP threat sharing overhaul
  131. Canonical reveals details of Ubuntu Forums hack
  132. POP3 Server Brute Forcing Attempts Using Polycom Credentials, (Wed, Jul 31st)
  133. Chrome, Firefox users targeted with account-hijacking plugins
  134. How to spot and avoid SMS scams
  135. US appeals court upholds warrantless collection of phone location data
  136. MIT report says it didn't seek federal charges against Aaron Swartz
  137. Some home automation systems are rife with holes, security experts say
  138. Bogus Chrome, Firefox extensions pilfer social media accounts
  139. Are Businesses Rushing to BYOD Too Quickly?
  140. CIO concerns over security obstructing enterprise mobility
  141. Spammers adapt and embrace popular themes
  142. Review: Cloud Computing: Theory and Practice
  143. Free tool identifies risks in secure shell environments
  144. Qualys announces WAF Beta for Amazon EC2
  145. Umbrella by OpenDNS Service blocks advanced cyber attacks
  146. AWS cloud management APIs: Don't overlook a key security component
  147. More heavily URL encoded PHP Exploits against Plesk "phppath" vulnerability, (Tue, Jul 30th)
  148. Universities putting sensitive data at risk via unsecure email
  149. Car hack highlights march toward remote control of critical systems
  150. DDoS attack size growing dramatically
  151. Microsoft announces MAPP overhaul
  152. Study on private vs public sector software glitches
  153. Syrian hackers target White House staffers, Reuters
  154. ERM: Old concept, new ideas
  155. Opponents of NSA surveillance aren't giving up after House vote
  156. Microsoft expands bug info-sharing program to larger crowd
  157. RSA president leaving to take cloud job at parent EMC
  158. Is Snowden a Russian citizen? No, it's just a Google Translate trick
  159. Yale grad's 'Prism' program turns text metadata into wavy art
  160. EMC president's move to subsidiary RSA shows security a priority
  161. Security complexity and internal breaches are key concerns
  162. FTC crackdown on "free gift card" scammers
  163. Sharp increase in blended, automated attacks
  164. Norman Shark updates Malware Analyzer G2
  165. nPulse updates its flow and packet capture appliance
  166. BGP multiple banking addresses hijacked, (Mon, Jul 29th)
  167. Hijacking ships and planes with cheap GPS spoofers and laptops
  168. University condemns court ban of research paper on flaws in car lock system
  169. Apple Dev Center partially back online, still no details about the hack
  170. Pinterest joins Twitter in supporting Do No Track
  171. To achieve good security, you need to focus on business
  172. The future of phishing: Credit card redirection
  173. Google Play store inundated with scam apps, Symantec says
  174. The scary implications of Google Glass
  175. Video: Hackers for hire
  176. Online privacy: How did we get here?
  177. Offshore providers with no cloud strategy risk their future
  178. Don't get pwned at Black Hat, DEF CON
  179. Week in review: Critical SIM encryption flaw, Apple Dev Center hack, key security metrics
  180. Dovecot / Exim Exploit Detects, (Mon, Jul 29th)
  181. Defending Against Web Server Denial of Service Attacks, (Sat, Jul 27th)
  182. Wireshark 1.8.9 and 1.10.1 Security Update, (Sun, Jul 28th)
  183. InfoSec community mourns the loss of well-known hacker Barnaby Jack
  184. Bitdefender Safepay offers secure browsing for online banking, shopping
  185. US will not seek death penalty for Edward Snowden
  186. Top hacker dies days before scheduled Black Hat talk
  187. ISC BIND DoS, (Fri, Jul 26th)
  188. Microsoft: Almost 90 percent of Citadel botnets in the world disrupted in June
  189. Critics urge end of passwords, but alternatives not ready for prime time
  190. Five indicted in massive hacking scheme
  191. Some privacy advocates question mobile apps agreement
  192. Stanford University suffers another data breach
  193. US SEC data leak shows lax data access practices
  194. Feds to web firms: Hand over encryption keys and user passwords
  195. Feds to web firms: hand over encryption keys and user passwords
  196. Tight NSA spy vote gives hope to program critics
  197. SQL flaws remain an Achilles heel for IT security groups
  198. Oil, gas field sensors vulnerable to attack via radio waves
  199. Open-source project, Crypton, seeks to make encryption easier
  200. Five charged with stealing 160+ million credit card numbers
  201. How to avoid a social engineering attack at Black Hat and Def Con
  202. NTODefend now more effectively blocks application vulnerabilities
  203. Preventing the exploitation of human vulnerabilities
  204. Five charged with stealing 160+ million credit card numbers
  205. Event: Hacker Halted USA 2013
  206. Cyber security is central to long-term economic growth
  207. IBM unveils software to identify and predict security risk
  208. The impact of weak threat intelligence on organizations
  209. Record malware growth in China, Ukraine and Saudi Arabia
  210. A Couple of SSH Brute Force Compromises, (Thu, Jul 25th)
  211. A couple Site Updates, (Thu, Jul 25th)
  212. Cybercriminals increasingly use the Tor network to control their botnets, researchers say
  213. U.S. Cloud Firms Suffer From NSA PRISM Program
  214. PayPal opens up bug bounty program to minors
  215. European companies should stop sending data to the US, German privacy officials say
  216. Plans to centralize cybersecurity with DHS seen as step forward
  217. From cruise offers to banking Trojans, SMS spam clogs channels
  218. Five indicted in massive hacking scheme
  219. TOR-based botnets on the rise
  220. US lawmakers shoot down legislation for limiting NSA spying
  221. DHS to set up "cybersecurity shop" for govt agencies
  222. Economic growth and national security are at risk
  223. Apple's developer site overhaul continues following breach
  224. 8 tips to enhance your online privacy
  225. US House votes against reining in NSA phone records collection
  226. Five things to consider for a mobile security policy
  227. Malicious apps exploiting Android "Master Key" bug found
  228. Key security metrics revealed
  229. Bit9 Introduces enterprise Mac security
  230. A historical overview of the cyberattack landscape
  231. The rise of sophisticated malware
  232. Solera Networks enhances advanced threat protection
  233. Executives lack confidence in their cyber security
  234. Review: Introduction to Cyber-Warfare
  235. Digital Advertising Alliance Sets Sights on Mobile Consumer Privacy
  236. Citadel malware active on 20,000 PCs in Japan, says Trend Micro
  237. Syrian Electronic Army hacks into Viber support website
  238. Internet Explorer best at malware and privacy protection
  239. Ponzi scheme involving Bitcoin exposed
  240. Snowden free to leave Moscow airport
  241. Bogus AmEx notification leads to thorough phishing
  242. SIM card vulnerabilities easy to fix, researcher says
  243. Bogus "Royal Baby: Live Updates" email leads to malware
  244. SEC charges Texas man with running Bitcoin Ponzi scheme
  245. A question of trust
  246. Multi-stage attack compromises customers of French webhost OVH
  247. Android spyware infections on the rise, report says
  248. Symantec spots two Android apps using 'master key' vulnerability
  249. Cisco Snorts up Sourcefire in $2.7bn acquisition
  250. U.S. cloud firms face backlash from NSA spy programs