View Full Version : Security News



  1. Pwn Pad: A tablet for penetration testers
  2. Week in review: Facebook, Apple hacks, APT1, and mobile phishing
  3. A framework for building privacy-oriented apps
  4. Why I think you should try Bro, (Mon, Feb 25th)
  5. "My Computer is Acting Strangely", (Sat, Feb 23rd)
  6. Cyber-Attackers Most Often Target Nine Business Apps: Research Report
  7. U.S. urged to take comprehensive action on Chinese cyberespionage
  8. Microsoft joins list of recently hacked companies
  9. Zendesk hack a reminder of SaaS risk
  10. DNS reveals the top cyberthreats of 2012. And you guessed it ... no one is safe.
  11. Gartner: Firms must redraw battle lines to combat new DDoS attacks
  12. HTC settles with FTC over security issues in tablets, smartphones
  13. Another Friday Night Disclosure: Microsoft
  14. Another Friday Night Disclosure: Microsoft
  15. What has Iran been up to lately?, (Fri, Feb 22nd)
  16. Google Pixel Is a New Style of Chromebook for Cloud Computing
  17. Facebook said to fix OAuth-based account hijacking flaw
  18. GAO raps Census Bureau's data protection practices
  19. Mac malware: New Gatekeeper bypassing Mac OS X virus discovered
  20. Four tips for getting the most out of your SIEM
  21. Zendesk says breach compromised email addresses
  22. NBC.com hacked to serve up banking malware
  23. Advanced volatile threat: New name for old malware technique?
  24. University of Wollongong to solve data sharing woes
  25. Mandiant report on Chinese cyberespionage used as bait in spear-phishing attacks
  26. Mandiant APT1 report used as a lure in phishing campaigns
  27. When web sites go bad: bible . org compromise, (Fri, Feb 22nd)
  28. Mobile phishing geared towards online banking users
  29. OAuth flaw allowed researcher full access to any Facebook account
  30. China's Cyber-War Against U.S. IT Assets Demands a Strong Response
  31. Twitter implements DMARC standard to fight phishing
  32. Zendesk breach affects Tumblr/Pinterest/Twitter, (Fri, Feb 22nd)
  33. Zendesk hack endangers Tumblr, Twitter and Pinterest users
  34. Mandiant APT1 report used as a lure in phishing campaigns
  35. Real world social engineering challenge at HITBSECCONF2013
  36. IBM shows where vulnerabilities appear in iOS apps
  37. Oracle, Apple release critical updates for Java
  38. Hidden security threats on enterprise networks
  39. Silent Text iOS app can auto-delete sent messages
  40. IBM shows where vulnerabilities appear in iOS apps
  41. ESET releases two-factor authentication software solution
  42. IS Decisions releases FileAudit 4
  43. Citrix introduces XenMobile MDM
  44. Chinese Hackers
  45. VMware releases new and updated security advisories, (Fri, Feb 22nd)
  46. China’s Cyber-War Against U.S. IT Assets Demands a Strong Response
  47. NBC.com News Portal Blocked by Google After Malware Detected
  48. PHP 5.4.12 and PHP 5.3.22 released http://www.php.net/ChangeLog-5.php, (Fri, Feb 22nd)
  49. It's a Dangerous Web Out There, (Thu, Feb 21st)
  50. NBC website serving malware - stay away!
  51. Failing to Manage Digital Certificates, Crypto Keys Can Cost Millions: Study
  52. SSHD rootkit in the wild, (Thu, Feb 21st)
  53. Fake Mandiant APT Report Used as Malware Lure, (Thu, Feb 21st)
  54. NBC site redirecting to Exploit kit, (Thu, Feb 21st)
  55. IBM Adds iOS Security to New MobileFirst Portfolio
  56. How Colorado's CISO is revamping the state's information security -- on a $6,000 budget
  57. Mandiant gains instant fame after Chinese hack report
  58. Security firms slow to react to spear phishing like that used in China hack
  59. Chinese Hackers
  60. Malicious URLs eclipsing botnets as malware distribution leader
  61. Review: Advanced Persistent Threat
  62. US students get cracking on Chinese malware code
  63. Identity fraud in US reaches highest level in three years
  64. Jeep joins Burger King on Twitter hacked list, inspires MTV, BET to fake breaches
  65. Many companies likely affected by compromise of popular iOS developer forum
  66. Don't get Apple picked: How to protect your Mac from theft in public places
  67. Rogue Chrome extension hijacks Facebook accounts
  68. 25% of DDoS attacks in 2013 will be application-based
  69. Google account hijacking dramatically reduced
  70. Security is top reason why IT adopts single sign-on
  71. FireMon expands situational awareness with Security Manager 7.0
  72. Cenzic Enterprise integrates with F5 BIG-IP ASM
  73. Check Point introduces high-performance data center security appliance
  74. Chinese Cyber-Spying Shows Why U.S. Must Bolster Network Defenses
  75. Adobe Issues Reader, Acrobat Security Updates to Stave Off Attacks
  76. Google Bolsters Email Security Defenses Against Hackers, Spammers
  77. Google Bolsters Email Security Defenses Against Hackers, Spammers
  78. Adobe patches Acrobat and Reader, Mozilla debuts Firefox built-in PDF viewer
  79. Apple ships Java update, malware scrubber after confirming attacks on own Macs
  80. Citrix releases XenMobile MDM for Apple iOS, Android devices
  81. SANS SCADA Summit at Orlando - Bigger problems and so far from getting them solved, (Wed, Feb 20th)
  82. Adobe Reader 11.0.02 now live (no security bulletin yet) http://www.adobe.com/support/security, (Wed, Feb 20th)
  83. Twitter entreats users to use better passwords
  84. $400 million risk lurking inside global enterprises
  85. Oracle, Apple release critical updates for Java
  86. 12.6 million identity fraud victims identified in the U.S.
  87. Timeline: Hacks Related to Apple
  88. Apple confirms being hit in recent watering hole attack
  89. Update: Flash Player Exploit Targeting Macs and Windows
  90. Oracle releases new Java fixes, speeds up patching cycle
  91. China biggest, but not the only country engaged in cyberespionage
  92. China's Defense Ministry calls accusations of state-sponsored hacking groundless
  93. Twitter calls for smarter password habits following Jeep, Burger King hacks
  94. Oxford University briefly blocks Google Docs in anti-phishing effort
  95. Mozilla changes policy to limit risk of subordinate CA certificate abuse
  96. Apple victim of malware attack
  97. Startup spins up identity and access-control cloud service
  98. How CSOs are enabling secure BYOD
  99. Qualys CEO to address security in a hyperconnected world at RSA Conference 2013
  100. Alert Logic releases new log manager
  101. Tips to overcome PHI security obstacles
  102. SmishGuru simulated attack service launches
  103. Update Palooza, (Wed, Feb 20th)
  104. Chinese Military Group Identified in Attacks on U.S. Networks: Mandiant
  105. Apple One of the "Other Companies" Hacked
  106. Chinese Military Group Identified in Attacks on U.S. Networks: Mandiant
  107. Apple Java Update APPLE-SA-2013-02-19-1 Java for OS X 2013-001 and Mac OS X v10.6 Update, (Tue, Feb 19th)
  108. EDUCAUSE Breach, (Tue, Feb 19th)
  109. Oracle Updates Java (Java 7 Update 15, Java 6 update 41), (Tue, Feb 19th)
  110. Firefox 19 Release with various security fixes., (Tue, Feb 19th)
  111. APT1, Unit 61398 and are state sponsored attacks real, (Tue, Feb 19th)
  112. Meet Mandiant, the company pulling the covers off alleged Chinese hackers
  113. Critical infrastructure protection: Maybe thinking good thoughts will make us safe
  114. Kaspersky apologizes for antivirus update that continues to disrupt customer nets
  115. New report says cyberspying group linked to China's army
  116. Chinese Army unit is behind cyber espionage campaigns, researchers claim
  117. Facebook Confirmed: Several Other Companies Hacked
  118. Security pros should listen with their heads, not their hearts
  119. The sophistication of risky apps, mobile misbehavior and spyware
  120. Anonymous hacks U.S. State Department and investment firm, leaks data
  121. New report says cyberspying group linked to China's army
  122. Flip side to Burger King Twitter hack: Many new followers
  123. F5 Networks releases hybrid cloud solution for mobile application management
  124. Duo Security launches secure mobile ID
  125. Modeling, customizing, and automating applications with AWS OpsWorks
  126. Delta Airlines spam delivers Citadel Trojan
  127. Virtual appliance fuels Bring Your Own Identity
  128. Antibot: Network-based botnet removal tool
  129. Facebook Targeted in 'Sophisticated Attack' Using Java Exploit
  130. BlackBerry Enterprise Server can be compromised due to TIFF-processing vulnerabilities
  131. Freezing Android devices to break disk encryption
  132. EU privacy regulators promise action on Google privacy policy changes
  133. Freezing Android devices to break disk encryption
  134. How to successfully submit conference talks
  135. Facebook Hacked, Mobile Dev Watering Holes, and Mac Malware
  136. Facebook malware campaign targeting Bulgarian users
  137. Adobe to release emergency patches for Reader, Acrobat
  138. Certificate Authorities Form Web Security Standard Advocacy Group
  139. Fake invoices in personalized emails deliver ransomware
  140. Facebook employees ambushed by zero-day exploit
  141. Week in review: Bit9 hack, malicious applications of augmented reality, and Adobe 0-day mitigation
  142. Adobe Acrobat and Reader Security Update Planed this Week, (Sun, Feb 17th)
  143. Home Networks, Including Mac Systems, Rife With Bots
  144. Home Networks, Including Mac Systems, Rife With Bots
  145. HP ArcSight Connector Appliance and Logger Vulnerabilities, (Sun, Feb 17th)
  146. Fedora RedHat Vulnerabilty Released, (Sat, Feb 16th)
  147. Retailers, Restaurants Remain Attractive Targets for Cyber-Criminals
  148. Contest aims to boost state of password encryption
  149. Facebook targeted by hackers, says no user data compromised
  150. Predicting the Tech Future
  151. Google Play shares too much personal info, app developer says
  152. Certificate authorities band together to boost security
  153. Russian dashboard cameras, YouTube beam meteor explosion worldwide
  154. Lawmakers, business execs defend privacy in CISPA
  155. Avoiding basic BYOD blunders
  156. Reveton 'police ransom' malware gang head arrested in Dubai
  157. Facebook may be the third wheel in your relationship
  158. Researchers reveal the identity of a Chinese hacker
  159. Most Americans think cyber warfare is imminent
  160. Uyghur Mac users targeted with spear-phishing emails
  161. Looking for some packets going to tcp/8520, (Fri, Feb 15th)
  162. Tax-themed malicious spam bombard inboxes
  163. iOS flaw used to bypass iPhone's lockscreen
  164. Event: HITBSecConf2013 - Amsterdam
  165. Mobile network infections increase by 67%
  166. Successful ways of undermining cybercrime ecosystems
  167. Video: Pirate Party MEP talks online child safety
  168. Symantec unveils new SSL algorithms and web security products
  169. Apple Working on Exchange-Crippling iOS 6.1 Bug
  170. Adobe Working on Patches for Newly Discovered Zero-Day Code Flaws
  171. Adobe Working on Patches for Newly-Discovered Zero-Day Code Flaws
  172. Reactions to Obama's Executive Order on cybersecurity
  173. Google Play's Privacy Policies Assailed by Software Developer
  174. Microsoft patches IE with record-setting updates to prep browser for Pwn2Own
  175. Phishing attacks target home workers as easy 'back door'
  176. Adobe confirms zero-day exploit bypasses Adobe Reader sandbox
  177. EU cybersecurity agency warns about over-reliance on cloud
  178. Obama executive order redefines critical infrastructure
  179. Targeted online attacks rise against Uyghur minority
  180. Spanish police break up â?¬1 million ransomware crime ring
  181. Security pros say their companies invest in the wrong technologies
  182. LA Times website redirected users to exploit kit for over six weeks
  183. Mitigate the Adobe Reader/Acrobat XI Vulnerability
  184. Adobe offers mitigation for Reader 0-day attack, fix is yet to come
  185. Cloud computing in critical information infrastructure protection
  186. Phishing campaigns run rampant on social networks
  187. 11 arrested in takedown of prolific ransomware gang
  188. Lawmakers reintroduce cyberthreat information-sharing bill
  189. Emergency Alert System devices vulnerable to hacker attacks, researchers say
  190. Review: Windows 8 Inside Out
  191. 7,000 Fake Identities Equals 200 Million USD
  192. Infosec pros don't trust their own networks
  193. Qualys and iViZ partner on cloud-based web application security
  194. Auditd is your friend, (Thu, Feb 14th)
  195. Do APTs present a credible threat to national security?
  196. SmartShare: Free tool for secure social sharing
  197. CA streamlines identity and access management
  198. Obama Cyber-Security Executive Order Lacks Legislative Backbone
  199. ISC Monthly Threat Update - February 2013 http://isc.sans.edu/podcastdetail.html?id=3121, (Thu, Feb 14th)
  200. "Police" Ransom Trojan Gang Busted
  201. Obama Cyber-Security Order a Good First Step, Experts Say
  202. TDoS-as-a-service ads pop up on publicly accessible forums
  203. Microsoft unleashes a Patch Tuesday to make your head spin
  204. Serious data breaches take months to spot, analysis finds
  205. Obama cybersecurity order lacks bite, security experts say
  206. Yahoo lambasted over using outdated Java with SiteBuilder
  207. Adobe releases patches for Flash Player and Shockwave Player
  208. Retailers a prime target for cyber criminals in '12, says Trustwave
  209. Cryptome site, Twitter and email account hacked again
  210. Adobe Reader/Acrobat XI Vulnerable, Et Cetera
  211. Hackers pollute legitimate JavaScript code to spread malware
  212. Microsoft Patch Tuesday Addresses 57 Security Vulnerabilities
  213. Adobe Reader zero-day exploit spotted in the wild
  214. Global malicious websites increase by 600%
  215. Obama signs cybersecurity order
  216. Obama live stream unaffected despite Anonymous threats
  217. Microsoft monthly patches touch Exchange, Windows, Explorer
  218. DaVinci surveillance malware distributed via zero-day Flash Player exploit, researchers say
  219. Combating security breaches with managed file transfer technology
  220. More adobe reader and acrobat (PDF) trouble, (Wed, Feb 13th)
  221. People worry more about being phished at home than at work
  222. ATM skimming ring compromised over 6,000 bank accounts
  223. Flickr bug made users' private photos public
  224. Zscaler delivers big visibility security analytics
  225. Samsung unveils new cloud displays
  226. McAfee delivers unified rapid-response security management
  227. Opportunistic scanning from cloud to endpoint
  228. Microsoft Patch Tuesday Addresses 57 Security Vulnerabilities
  229. Companies Want National Policies to Combat Cyber-Spies
  230. Companies Want National Policies to Combat Cyber-Spies
  231. Microsoft February 2013 Black Tuesday Update - Overview, (Tue, Feb 12th)
  232. Microsoft releases 12 bulletins that address 57 vulnerabilities
  233. Adobe Feb 2013 Black Tuesday patches, (Tue, Feb 12th)
  234. Data protection practices in EU and Asia
  235. Startup Nok Nok Labs pitches strong new authentication process
  236. Mega pays out first batch of bounties, its crypto still intact
  237. Mega pays out first batch of bounties, but not for breaking its crypto
  238. Highlights from 450 global data breach investigations
  239. Comment Group hackers specialize in high-profile targeted attacks
  240. Unintended, malicious and evil applications of augmented reality
  241. Malware authors revert to phishing approach to trick bank defenses
  242. Mobile malware still small, but 'malnets' to rise up
  243. Hacker arrested after taunting police with clues attached to cat
  244. Bit9 hack casts spotlight on security industry practices
  245. M2M offers hackers a new frontier for mischief
  246. Lawmakers to reintroduce controversial information-sharing bill
  247. 5 myths about awareness
  248. Learn to fail and avoid the next cloud outage
  249. Citi Group customers targeted with malware-laden alerts
  250. UK hit by 120,000 cyber attacks a day