View Full Version : Security News



  1. FBI busts operator of Silk Road, seizes $3.6M in Bitcoins
  2. Mocana unwraps protection for iOS 7 apps
  3. US demanded access to encryption keys of email provider Lavabit
  4. Bitcoin forum goes offline after hack
  5. Yahoo abandons T-shirt rewards for vulnerability information
  6. Senator vows fierce defense of NSA data collection, surveillance programs
  7. The Internet of Things will change everything
  8. Are workers drowning in a sea of ineffective technology?
  9. Free eBook: Guide to Monitoring Virtualized Environments
  10. Silk Road taken down, owner arrested
  11. Technology eliminates bot-infected traffic from advertising campaigns
  12. Bruce Schneier: The battle for power on the Internet
  13. McAfee solution remediates advanced malware
  14. Aruba Networks releases cloud Wi-Fi solution
  15. US DOJ opposes company requests to publish surveillance statistics
  16. Obamacare related domain registration spike, Government shutdown domain registration beginning, (Wed, Oct 2nd)
  17. CSAM: Misc. DNS Logs, (Wed, Oct 2nd)
  18. IE Vulnerability Update #Japan #Metasploit
  19. ZeroAccess: The Most Profitable Botnet
  20. Silent Circle moves away from NIST cryptographic standards, cites uncertainty
  21. Google adds search by image to Chrome browser
  22. Yahoo concerned that release of redacted FISA papers may mislead
  23. NSA encryption-defeating efforts will backfire, privacy advocates say
  24. More NSA leaks to come, Guardian says
  25. Could the EU cyber security directive cost companies billions?
  26. Innovation, big data and the future of information security
  27. Is wireless the Trojan horse in your network security?
  28. Get a VIP ticket to HITBSecConf and $1337 of travel money
  29. Portable USB drive fixes malware-crippled machines
  30. Get a VIP ticket to HITBSecConf and $1337 od travel money
  31. AlgoSec updates security management suite
  32. Splunk and ForeScout partner on big data and security intelligence
  33. Splunk Enterprise 6 released
  34. Whitepaper: Exploring white box cryptography
  35. Video: Cracking corporate passwords
  36. Connections between personality types and phishing
  37. "microsoft support" calls - now with ransomware, (Wed, Oct 2nd)
  38. SAP seeks an edge from NSA surveillance worries
  39. Public release of IE exploit could spark widespread attacks
  40. Privacy campaigners barred from releasing Facebook's response to complaints
  41. Former Qwest CEO out of prison, blames NSA for troubles
  42. Researchers sinkhole half a million ZeroAccess bots
  43. CSAM! Send us your logs!, (Tue, Oct 1st)
  44. Facebook extends Graph Search to include posts, updates, comments
  45. iOS 7 Adds Multipath TCP, (Tue, Oct 1st)
  46. Twitter DM spam/malware, (Mon, Sep 30th)
  47. Do you have your network perimeter secured against downloading malicious content?, (Sat, Sep 28th)
  48. Tools for reviewing infected websites, (Fri, Sep 27th)
  49. Cigital nets $50M investment from LLR Partners
  50. Security company scours 'Dark Web' for stolen data
  51. Fake AdBlock Plus app removed from Google's Play store
  52. Intel to acquire network security firm Sensory Networks
  53. Shutdown could test IT security at federal agencies
  54. Is that hotspot safe to use? Wi-Fi Alliance wants to help
  55. Symantec seizes part of massive peer-to-peer botnet ZeroAccess
  56. Tech firms push for NSA surveillance transparency bills
  57. Hackers gather in Colombia for Security Zone 2013
  58. MEPs hear US privacy experts, whistleblowers and Snowden statement
  59. Over 50% don't protect their Android devices
  60. Cybercrime service providers arrested in Europe
  61. Whitepaper: Top mobile application security threats
  62. Common data breach handling mistakes
  63. Rapid7 offers free tools and terabytes of its own research
  64. BrowserCheck gets automated daily scanning and Mac support
  65. NSA creates US citizens' profiles by collecting metadata, public and commercial data
  66. Security industry in 'rut,' struggling to keep up with cybercriminals
  67. Forget fingerprints: Your iris is your new identity
  68. Brute-force malware targets email and FTP servers
  69. Privacy: a Core Finnish Value
  70. Latest IE 0-day still unpatched, attacks exploiting it go back three months
  71. 7 sneak attacks used by today's most devious hackers
  72. The motives behind nation state driven cyber attacks
  73. UK to create new cyber defence force
  74. Two youngsters arrested for different DDoS attacks
  75. Average online bank account is accessed by 2.4 unique devices
  76. The impact of false positives on web application security scanners
  77. Guidelines to manage increased IT risk
  78. Average online bank account is accessed by 2.4 unique devices
  79. Set, manage and monitor privileged account security
  80. Protect high-value transactions on iOS and Android
  81. Cyberoam launches next-generation firewall appliances
  82. Free guide: Server-gated cryptography
  83. Week in review: Data broker databases breached, Apple Touch ID hack, and possible solution to click fraud problem
  84. Microsoft received 37,000 end-user data requests in first half of year
  85. Iran accused of hacking into US Navy computers
  86. Rights groups plan anti-NSA surveillance rally in D.C.
  87. France sanctions Google for European privacy law violations
  88. Google finally squashes IM bug
  89. US gov't shutdown could take money from IT workers, contracts
  90. IE zero-day vulnerability exploited more widely than previously thought
  91. Hack of major data brokers weakens bank authentication
  92. Cisco IOS updates fix 10 denial-of-service vulnerabilities
  93. Researchers may have solved the click fraud problem
  94. US intelligence heads speak for FISA preservation
  95. Government IT Leaders Wrestle With Security Risks
  96. NSA admits employees spied on loved ones
  97. Usage-based auto insurance found to pose privacy risks
  98. NSA: Surveillance court says no upper limit on phone records collection
  99. New information-theft malware 'Napolar' is gaining traction, researchers warn
  100. Tor-using Mevade botnet is stealthy new version of old threat
  101. New TDL Dropper Variants Exploit CVE-2013-3660
  102. Legislation aims to end bulk collection of phone records
  103. Challenges faced by top CSOs
  104. Windows 8 Business Checklist
  105. Cloud Security Alliance releases Cloud Controls Matrix 3.0
  106. Users want a seamless experience in public Wi-Fi
  107. Microsoft, Facebook and Mozilla hunt for developers at HackWEEKDAY
  108. Cybercriminals exploit most news within 22 hours
  109. Watchful Software updates its information protection solution
  110. Espionage campaign targeting Asian supply chains uncovered
  111. NSA chief seeks more data from private sector in sharing offer
  112. Egnyte launches 'PRISM protection' file sharing appliance to beat cloud worries
  113. 5 Ways CIOs Need to Prepare for Obamacare
  114. Malicious browser extensions pose a serious threat and defenses are lacking
  115. Suitcase-size device may help save lifes of disaster victims
  116. US government security background checks fumbled by investigators
  117. How do you monitor DNS?, (Thu, Sep 26th)
  118. Amateur hacker behind DDoS attack on China?
  119. New US bill aims to curb NSA collection of phone and other records
  120. 'Viceroi' algorithm improves detection of click fraud
  121. 'Icefog' spying operation targeted Japan, South Korea
  122. Is mobile anti-virus even necessary?
  123. Industry leaders perceive numerous security threats to their data
  124. New TDL dropper variants exploit CVE-2013-3660
  125. Organizations fear their privacy activities are insufficient
  126. Whitepaper: Securing Multiple Domains with SSL
  127. Icefog cyber espionage campaign exposed
  128. Organizations are flying blind as they embrace cloud services
  129. Deploy endpoint encryption technologies with Wave Cloud 2014
  130. CORE Impact Pro 2013 R2 gets enhanced web services capabilities
  131. Amazon.com released Fire OS 3.0 "Mojito"
  132. Big data analytics for security intelligence
  133. Social media, mobile phones top attack targets
  134. Sudan drops off Internet amid internal strife
  135. Google gets kudos for tossing older Chrome plug-in API
  136. Data broker databases breached, stolen info used by ID theft service
  137. Yahoo ID recycling scheme is potential security minefield
  138. Review: 1Password: Manage passwords or die trying
  139. Apple Touch ID hack was easier than expected
  140. Employees keep using personal cloud services to store work documents
  141. Former senators say Congress needs to rein in the NSA
  142. Google yanks sketchy iMessage clone for Android from app store
  143. Indian biometric ID project faces court hurdle
  144. Virginia Tech breach exposes data on 145K job applicants
  145. Java exploits jump, Android malware emerges outside app stores
  146. Reactions from the security community to iOS 7
  147. Most tech executives planning for cyber attacks
  148. Free Wi-Fi, but at what cost?
  149. Budget and job trend data for CISOs
  150. Phishing and malicious attachments on the increase
  151. MEPs raise suspension of EU-US bank data deal
  152. Free eBook: 5 Things You Need to Know About Disaster Recovery Planning
  153. Cancel data sharing deal with US, EU politicians urge
  154. Chrome will block NPAPI plug-ins over stability, security concerns
  155. Dropbox joins bid to publish spy data requests
  156. Attackers sharpen skills: What that really means for CISOs
  157. Survey highlights ignorant IT behavior in the workplace
  158. Twitter fixes Tweet button issue that downloaded a torrent file
  159. Apple is a tempting phishing target for scammers
  160. Unofficial Android iMessage app can steal info and download malware
  161. Major increase in Filecoder malware
  162. Concerns around insider threats escalate
  163. Rootkit detector for OS X
  164. Widespread disregard for corporate cloud policies
  165. Researcher despairs of critical SIM flaws being fixed before attacks happen
  166. Cisco enhances safety and security solutions
  167. A short overview of Android banking malware
  168. Apache Struts security update disables vulnerable feature
  169. How do you spell "PSK"?, (Mon, Sep 23rd)
  170. IE 0-day attack reports push ISC to raise official threat level
  171. Federal cyber security pros lack confidence in FISMA
  172. Encryption is still the best defense, despite NSA code-cracking
  173. Security org raises Internet threat level after seeing expanded IE attacks
  174. Rather than walling off from NSA, Brazil should welcome whistleblowers
  175. LinkedIn denies harvesting user email accounts without permission
  176. German hackers say old technique can bypass Apple's Touch ID
  177. CCC hackers say they cracked Apple's Touch ID
  178. Big data investments continue to rise
  179. Is your status update also a red flag for danger?
  180. Investigating the security of the Firefox OS
  181. Free guide to iOS 7
  182. HP unveils new family of next-generation firewall appliances
  183. Week in review: Undetectable hardware Trojans, Chinese hackers for hire, and latest IE 0-day insight
  184. Sen. Franken seeks data on privacy controls in iPhone 5s fingerprint tech
  185. RSA advises customers to stop using NSA-influenced encryption algorithm
  186. Threat Level Yellow: Protection recommendations regarding Internet Explorer exploits in the wild, (Fri, Sep 20th)
  187. Gang exploits both physical and system security during bank robbery
  188. Apple's iOS 7 patches 80 vulnerabilities
  189. Experts praise Pentagon's march to security standards
  190. PHP updates released 19 SEP 2013 - http://www.php.net/downloads.php, (Fri, Sep 20th)
  191. Clever email campaign delivers deadly ransomware to orgs
  192. Belgacom was breached by Britain's GCHQ
  193. Eight arrested over £1.3 million theft from Barclays bank
  194. Websites of energy sector companies compromised in watering hole attack
  195. Tech group asks 21 countries to disclose surveillance requests
  196. US FTC lacks data breach authority, says accused medical lab
  197. Vulnerability in IE Could Allow Remote Code Execution
  198. HP helps government agencies protect information
  199. ENISA report on top cyber threats
  200. Cost of cyber crime study: United States
  201. DeviceLock now prevents data leakage from Macs
  202. Acronis advances secure BYOD with mobilEcho
  203. Another flawed Office update tells users to buy the suite
  204. Hacking courses offer cybercrooks tips on how to hone skills
  205. Healthcare IT Security Is Difficult, But Not Impossible
  206. Critics say federal court got it wrong in defense of NSA activity
  207. Researchers discover ties between TDSS and ZeroAccess rootkit families
  208. iOS 7 Security Prompts
  209. Snowden's role provided 'perfect cover' for NSA data theft
  210. Government Networks Unprepared for Cloud, Big Data Transitions
  211. Hackers exploit critical IE bug; Microsoft promises patch
  212. 7 Biggest IT Compliance Headaches and How CIOs Can Cure Them
  213. New wave of Shylock Trojan targets bank customers
  214. Beware of 419 scam emails delivered via CNNís "Email This" feature
  215. The legal implications of BYOD
  216. Mobile data security remains weak
  217. Latest IE 0-day insight: Background, severity and solutions
  218. Phishers increasingly target brands
  219. Whitepaper: Critical priorities in enterprise security
  220. What keeps IT pros up at night?
  221. CloudSigma launches hybrid hosting with private patching
  222. HP unveils community-sourced threat intelligence platform
  223. More Goodies in the Apple Security Update Basket!, (Wed, Sep 18th)
  224. 10,000+ to compete at world's biggest hacking competition
  225. Apple DDOS? Nope, just the update coming down!, (Wed, Sep 18th)
  226. Rootkit freezes computers' hard disk to respawn itself
  227. Cisco DCNM Update Released, (Wed, Sep 18th)
  228. Apple IOS 7 - Brace for Impact!, (Wed, Sep 18th)
  229. iTunes 11.1 released, fixes CVE-2013-1035 remote code execution vulnerability. (Look for specifics at http://support.apple.com/kb/HT1222 sometime soon), (Wed, Sep 18th)
  230. Chinese hackers for hire tied to Bit9 and Aurora attacks
  231. Microsoft issued Fix it for actively exploited IE 0-day
  232. LynuxWorks releases a rootkit detection system
  233. Vulnerability in IE Could Allow Remote Code Execution
  234. Security researchers create undetectable hardware trojans
  235. Space storms causing satellite failures that blunt Internet and TVs
  236. China-based hacking group behind hundreds of attacks on U.S. companies
  237. Firefox 24 delivers 17 security updates
  238. Self-healing BIOS security from HP
  239. Kaspersky Lab launches solution for multi-device security
  240. USB "condom" protects from mobile device juice jacking
  241. Software for DIY data recovery, data protection and data destruction
  242. Free guide: The Top 10 Reports for Managing Vulnerabilities
  243. Firefox 24.0 and Thunderbird 24.0 just released, both including security flaws., (Tue, Sep 17th)
  244. Apple releases security advisory to update to OS X Server v2.2.2, more here: http://support.apple.com/kb/HT1222, (Tue, Sep 17th)
  245. Microsoft Releases Out-of-Band Advisory for all Versions of Internet Explorer, (Tue, Sep 17th)
  246. 'HoneyDocs' lays irresistible bait for hackers
  247. Netfix plumbs pirate sites before buying TV shows
  248. Mobile Pwn2Own: $300k prize pool awaits successful contestants
  249. Too long passwords can DoS some servers
  250. Researchers create undetectable layout-level hardware Trojans