View Full Version : Security News

  1. Twitter DM spam/malware, (Mon, Sep 30th)
  2. Do you have your network perimeter secured against downloading malicious content?, (Sat, Sep 28th)
  3. Tools for reviewing infected websites, (Fri, Sep 27th)
  4. Cigital nets $50M investment from LLR Partners
  5. Security company scours 'Dark Web' for stolen data
  6. Fake AdBlock Plus app removed from Google's Play store
  7. Intel to acquire network security firm Sensory Networks
  8. Shutdown could test IT security at federal agencies
  9. Is that hotspot safe to use? Wi-Fi Alliance wants to help
  10. Symantec seizes part of massive peer-to-peer botnet ZeroAccess
  11. Tech firms push for NSA surveillance transparency bills
  12. Hackers gather in Colombia for Security Zone 2013
  13. MEPs hear US privacy experts, whistleblowers and Snowden statement
  14. Over 50% don't protect their Android devices
  15. Cybercrime service providers arrested in Europe
  16. Whitepaper: Top mobile application security threats
  17. Common data breach handling mistakes
  18. Rapid7 offers free tools and terabytes of its own research
  19. BrowserCheck gets automated daily scanning and Mac support
  20. NSA creates US citizens' profiles by collecting metadata, public and commercial data
  21. Security industry in 'rut,' struggling to keep up with cybercriminals
  22. Forget fingerprints: Your iris is your new identity
  23. Brute-force malware targets email and FTP servers
  24. Privacy: a Core Finnish Value
  25. Latest IE 0-day still unpatched, attacks exploiting it go back three months
  26. 7 sneak attacks used by today's most devious hackers
  27. The motives behind nation state driven cyber attacks
  28. UK to create new cyber defence force
  29. Two youngsters arrested for different DDoS attacks
  30. Average online bank account is accessed by 2.4 unique devices
  31. The impact of false positives on web application security scanners
  32. Guidelines to manage increased IT risk
  33. Average online bank account is accessed by 2.4 unique devices
  34. Set, manage and monitor privileged account security
  35. Protect high-value transactions on iOS and Android
  36. Cyberoam launches next-generation firewall appliances
  37. Free guide: Server-gated cryptography
  38. Week in review: Data broker databases breached, Apple Touch ID hack, and possible solution to click fraud problem
  39. Microsoft received 37,000 end-user data requests in first half of year
  40. Iran accused of hacking into US Navy computers
  41. Rights groups plan anti-NSA surveillance rally in D.C.
  42. France sanctions Google for European privacy law violations
  43. Google finally squashes IM bug
  44. US gov't shutdown could take money from IT workers, contracts
  45. IE zero-day vulnerability exploited more widely than previously thought
  46. Hack of major data brokers weakens bank authentication
  47. Cisco IOS updates fix 10 denial-of-service vulnerabilities
  48. Researchers may have solved the click fraud problem
  49. US intelligence heads speak for FISA preservation
  50. Government IT Leaders Wrestle With Security Risks
  51. NSA admits employees spied on loved ones
  52. Usage-based auto insurance found to pose privacy risks
  53. NSA: Surveillance court says no upper limit on phone records collection
  54. New information-theft malware 'Napolar' is gaining traction, researchers warn
  55. Tor-using Mevade botnet is stealthy new version of old threat
  56. New TDL Dropper Variants Exploit CVE-2013-3660
  57. Legislation aims to end bulk collection of phone records
  58. Challenges faced by top CSOs
  59. Windows 8 Business Checklist
  60. Cloud Security Alliance releases Cloud Controls Matrix 3.0
  61. Users want a seamless experience in public Wi-Fi
  62. Microsoft, Facebook and Mozilla hunt for developers at HackWEEKDAY
  63. Cybercriminals exploit most news within 22 hours
  64. Watchful Software updates its information protection solution
  65. Espionage campaign targeting Asian supply chains uncovered
  66. NSA chief seeks more data from private sector in sharing offer
  67. Egnyte launches 'PRISM protection' file sharing appliance to beat cloud worries
  68. 5 Ways CIOs Need to Prepare for Obamacare
  69. Malicious browser extensions pose a serious threat and defenses are lacking
  70. Suitcase-size device may help save lifes of disaster victims
  71. US government security background checks fumbled by investigators
  72. How do you monitor DNS?, (Thu, Sep 26th)
  73. Amateur hacker behind DDoS attack on China?
  74. New US bill aims to curb NSA collection of phone and other records
  75. 'Viceroi' algorithm improves detection of click fraud
  76. 'Icefog' spying operation targeted Japan, South Korea
  77. Is mobile anti-virus even necessary?
  78. Industry leaders perceive numerous security threats to their data
  79. New TDL dropper variants exploit CVE-2013-3660
  80. Organizations fear their privacy activities are insufficient
  81. Whitepaper: Securing Multiple Domains with SSL
  82. Icefog cyber espionage campaign exposed
  83. Organizations are flying blind as they embrace cloud services
  84. Deploy endpoint encryption technologies with Wave Cloud 2014
  85. CORE Impact Pro 2013 R2 gets enhanced web services capabilities
  86. released Fire OS 3.0 "Mojito"
  87. Big data analytics for security intelligence
  88. Social media, mobile phones top attack targets
  89. Sudan drops off Internet amid internal strife
  90. Google gets kudos for tossing older Chrome plug-in API
  91. Data broker databases breached, stolen info used by ID theft service
  92. Yahoo ID recycling scheme is potential security minefield
  93. Review: 1Password: Manage passwords or die trying
  94. Apple Touch ID hack was easier than expected
  95. Employees keep using personal cloud services to store work documents
  96. Former senators say Congress needs to rein in the NSA
  97. Google yanks sketchy iMessage clone for Android from app store
  98. Indian biometric ID project faces court hurdle
  99. Virginia Tech breach exposes data on 145K job applicants
  100. Java exploits jump, Android malware emerges outside app stores
  101. Reactions from the security community to iOS 7
  102. Most tech executives planning for cyber attacks
  103. Free Wi-Fi, but at what cost?
  104. Budget and job trend data for CISOs
  105. Phishing and malicious attachments on the increase
  106. MEPs raise suspension of EU-US bank data deal
  107. Free eBook: 5 Things You Need to Know About Disaster Recovery Planning
  108. Cancel data sharing deal with US, EU politicians urge
  109. Chrome will block NPAPI plug-ins over stability, security concerns
  110. Dropbox joins bid to publish spy data requests
  111. Attackers sharpen skills: What that really means for CISOs
  112. Survey highlights ignorant IT behavior in the workplace
  113. Twitter fixes Tweet button issue that downloaded a torrent file
  114. Apple is a tempting phishing target for scammers
  115. Unofficial Android iMessage app can steal info and download malware
  116. Major increase in Filecoder malware
  117. Concerns around insider threats escalate
  118. Rootkit detector for OS X
  119. Widespread disregard for corporate cloud policies
  120. Researcher despairs of critical SIM flaws being fixed before attacks happen
  121. Cisco enhances safety and security solutions
  122. A short overview of Android banking malware
  123. Apache Struts security update disables vulnerable feature
  124. How do you spell "PSK"?, (Mon, Sep 23rd)
  125. IE 0-day attack reports push ISC to raise official threat level
  126. Federal cyber security pros lack confidence in FISMA
  127. Encryption is still the best defense, despite NSA code-cracking
  128. Security org raises Internet threat level after seeing expanded IE attacks
  129. Rather than walling off from NSA, Brazil should welcome whistleblowers
  130. LinkedIn denies harvesting user email accounts without permission
  131. German hackers say old technique can bypass Apple's Touch ID
  132. CCC hackers say they cracked Apple's Touch ID
  133. Big data investments continue to rise
  134. Is your status update also a red flag for danger?
  135. Investigating the security of the Firefox OS
  136. Free guide to iOS 7
  137. HP unveils new family of next-generation firewall appliances
  138. Week in review: Undetectable hardware Trojans, Chinese hackers for hire, and latest IE 0-day insight
  139. Sen. Franken seeks data on privacy controls in iPhone 5s fingerprint tech
  140. RSA advises customers to stop using NSA-influenced encryption algorithm
  141. Threat Level Yellow: Protection recommendations regarding Internet Explorer exploits in the wild, (Fri, Sep 20th)
  142. Gang exploits both physical and system security during bank robbery
  143. Apple's iOS 7 patches 80 vulnerabilities
  144. Experts praise Pentagon's march to security standards
  145. PHP updates released 19 SEP 2013 -, (Fri, Sep 20th)
  146. Clever email campaign delivers deadly ransomware to orgs
  147. Belgacom was breached by Britain's GCHQ
  148. Eight arrested over £1.3 million theft from Barclays bank
  149. Websites of energy sector companies compromised in watering hole attack
  150. Tech group asks 21 countries to disclose surveillance requests
  151. US FTC lacks data breach authority, says accused medical lab
  152. Vulnerability in IE Could Allow Remote Code Execution
  153. HP helps government agencies protect information
  154. ENISA report on top cyber threats
  155. Cost of cyber crime study: United States
  156. DeviceLock now prevents data leakage from Macs
  157. Acronis advances secure BYOD with mobilEcho
  158. Another flawed Office update tells users to buy the suite
  159. Hacking courses offer cybercrooks tips on how to hone skills
  160. Healthcare IT Security Is Difficult, But Not Impossible
  161. Critics say federal court got it wrong in defense of NSA activity
  162. Researchers discover ties between TDSS and ZeroAccess rootkit families
  163. iOS 7 Security Prompts
  164. Snowden's role provided 'perfect cover' for NSA data theft
  165. Government Networks Unprepared for Cloud, Big Data Transitions
  166. Hackers exploit critical IE bug; Microsoft promises patch
  167. 7 Biggest IT Compliance Headaches and How CIOs Can Cure Them
  168. New wave of Shylock Trojan targets bank customers
  169. Beware of 419 scam emails delivered via CNNís "Email This" feature
  170. The legal implications of BYOD
  171. Mobile data security remains weak
  172. Latest IE 0-day insight: Background, severity and solutions
  173. Phishers increasingly target brands
  174. Whitepaper: Critical priorities in enterprise security
  175. What keeps IT pros up at night?
  176. CloudSigma launches hybrid hosting with private patching
  177. HP unveils community-sourced threat intelligence platform
  178. More Goodies in the Apple Security Update Basket!, (Wed, Sep 18th)
  179. 10,000+ to compete at world's biggest hacking competition
  180. Apple DDOS? Nope, just the update coming down!, (Wed, Sep 18th)
  181. Rootkit freezes computers' hard disk to respawn itself
  182. Cisco DCNM Update Released, (Wed, Sep 18th)
  183. Apple IOS 7 - Brace for Impact!, (Wed, Sep 18th)
  184. iTunes 11.1 released, fixes CVE-2013-1035 remote code execution vulnerability. (Look for specifics at sometime soon), (Wed, Sep 18th)
  185. Chinese hackers for hire tied to Bit9 and Aurora attacks
  186. Microsoft issued Fix it for actively exploited IE 0-day
  187. LynuxWorks releases a rootkit detection system
  188. Vulnerability in IE Could Allow Remote Code Execution
  189. Security researchers create undetectable hardware trojans
  190. Space storms causing satellite failures that blunt Internet and TVs
  191. China-based hacking group behind hundreds of attacks on U.S. companies
  192. Firefox 24 delivers 17 security updates
  193. Self-healing BIOS security from HP
  194. Kaspersky Lab launches solution for multi-device security
  195. USB "condom" protects from mobile device juice jacking
  196. Software for DIY data recovery, data protection and data destruction
  197. Free guide: The Top 10 Reports for Managing Vulnerabilities
  198. Firefox 24.0 and Thunderbird 24.0 just released, both including security flaws., (Tue, Sep 17th)
  199. Apple releases security advisory to update to OS X Server v2.2.2, more here:, (Tue, Sep 17th)
  200. Microsoft Releases Out-of-Band Advisory for all Versions of Internet Explorer, (Tue, Sep 17th)
  201. 'HoneyDocs' lays irresistible bait for hackers
  202. Netfix plumbs pirate sites before buying TV shows
  203. Mobile Pwn2Own: $300k prize pool awaits successful contestants
  204. Too long passwords can DoS some servers
  205. Researchers create undetectable layout-level hardware Trojans
  206. 30 Percent of transactions conducted from Tor are fraudulent
  207. GFI LanGuard 2014 released
  208. One in ten consumers lost money to online fraud
  209. Travelers regularly connect to free, unsecure Wi-Fi networks
  210. Tips for educational organizations on how to defend against online threats
  211. NSA impersonated Google in MitM attacks
  212. Evaluate the skill level of Linux pros
  213. Video: NSA hearing in the European Parliament
  214. The Essentials of Information Security Kit
  215. Zscaler cloud-based platform makes behavioral analysis mainstream
  216. Microsoft re-releases patches that were causing an install loop, (Mon, Sep 16th)
  217. Largest Belgian telecom breached by the NSA?
  218. How to protect your PC against devious security traps
  219. Security company says Nasdaq waited two weeks to fix XSS flaw
  220. FBI confirms they were behind Freedom Hosting's takeover
  221. Fake "new voicemail" notification targets Android WhatsApp users
  222. Proof-based system to secure the car
  223. What CISOs must learn from Bitcoin and a research team at Georgia Tech
  224. Free eBook: First Aid Kit for Sys Admins
  225. Secure mobility assessment tool
  226. Whitepaper: 20 practical tips on single sign-on and strong authentication
  227. SolarWinds Server & Application Monitor 6.0 released
  228. Week in review: Backdoored NIST standard revealed, Java's new whitelisting feature, and the new issue of (IN)SECURE Magazine
  229. Rogue hardware used in attempted cyberheist at Santander bank branch
  230. Surveillance court orders transparency review of its NSA opinions
  231. New Java feature aims to manage multiple version problems
  232. Update for Safari to version 5.1.10 is out (Fri, Sep 13th)
  233. Report: French ministers told to install Android sandbox if they want to use smartphones
  234. Court ruling a warning to companies on workers' Facebook privacy
  235. US Internet users less vigilant than ever about their online safety
  236. Happy Friday the 13th !, (Fri, Sep 13th)
  237. Java and Old Hash Algorithms, (Fri, Sep 13th)
  238. Java finally gets a whitelisting feature
  239. Apple issues final non-security update for OS X Mountain Lion
  240. Court decision in Google Street View case called unpersuasive, flawed
  241. Apple's iPhone 5S reopens debate on sensor data collection
  242. Critics question FTC's authority to bring data security complaints
  243. Bug bounty program slates $300K mobile hacking contest for Nov.
  244. Oracle adds long-awaited whitelisting capabilities to Java
  245. Dropbox takes a peek at files
  246. Aggressive ransomware scam redirects to child ****
  247. IT pros lack support to manage security intelligence
  248. Medical identity theft affects 1.84 million U.S. victims
  249. Free eBook: Intrusion Detection Systems with Snort
  250. Rootkit Cafe