View Full Version : Security News



  1. Americans were anxious about privacy even before NSA spying scandal
  2. When Hotel Alarms Sound, (Fri, Jun 14th)
  3. Microsoft protects cloud with directory-integrated two-factor authentication
  4. Even before NSA scandal, US residents were anxious about privacy breaches
  5. Why does the public now listen to an U.S. government whistleblower?
  6. Google warns Iranian users of politically-motivated phishing
  7. Fake Antivirus Scan Scam Via Google Play App Ads
  8. Eight charged for hacking global financial institutions
  9. The Iomega brand is now LenovoEMC
  10. US charges eight with multimillion-dollar cybercrime
  11. NSA whistleblower likely had easy access to classified data
  12. Obama's Cybersecurity Mandate Hits First Milestone
  13. SMS spam cruises for suckers
  14. Google detects phishing attacks in Iran ahead of elections
  15. Oppose PRISM-like programs today or lose you privacy tomorrow
  16. OWASP top 10 web application risks for 2013
  17. How orgs should handle personal data on IT systems that they don't control
  18. Automated password management for privileged accounts
  19. Log analysis and alert management platform
  20. Ping Identity updates cloud identity management platform
  21. TP-LINK announces Archer C7 Wi-Fi router
  22. Stupid Little IPv6 Tricks, (Wed, Jun 12th)
  23. NSA revelations could push terrorists to other channels
  24. Congress reacts to NSA's spying on U.S. citizens
  25. European commissioner demands Prism answers from US attorney general
  26. Sourceforge accounts hosting malicious files
  27. Bad Bad Piggies On Google Play
  28. 80+ orgs ask U.S. Congress to halt government surveillance
  29. Review: Vulnerability scanning with PureCloud
  30. To hack back or not to hack back?
  31. Organizations push for Congress to curtail NSA spying
  32. Google asks DOJ if it can release details on government data requests
  33. Bromium aims to protect users on the move with upgraded virtualization software
  34. Facebook, Twitter support Google's call for transparency in surveillance requests
  35. Senators, Google push for transparency at surveillance court
  36. Microsoft patches critical IE vulnerabilities and actively exploited Office flaw
  37. Gartner reveals Top 10 IT Security Myths
  38. ACLU files lawsuit challenging NSA surveillance
  39. NSA surveillance controversy: Much ado about nothing new?
  40. Researches test resilience of P2P botnets
  41. Worldwide security market to grow in 2013
  42. Tapproof security for Dropbox
  43. Trend Micro releases web app security offering
  44. Assess and score mobile application and device risks
  45. LockPath launches auditing tool
  46. Adobe updates app for e-signing documents
  47. Microsoft patches IE, Office and Windows
  48. vmware security advisory VMSA-2013-0008, (Tue, Jun 11th)
  49. Adobe June 2013 Black Tuesday Overview, (Tue, Jun 11th)
  50. Other Microsoft Black Tuesday News, (Tue, Jun 11th)
  51. Microsoft June 2013 Black Tuesday Overview, (Tue, Jun 11th)
  52. Booz Allen fires Snowdon, leaker of NSA spy docs
  53. How to Solve 4 Impending Windows 8 Problems
  54. Cities search for solution to phone-theft epidemic
  55. MIT researchers advance cloud security with end-to-end encryption
  56. Obama, Verizon, NSA sued for collecting U.S. citizens' phone call data
  57. Store passwords the right way, (Tue, Jun 11th)
  58. Reactions from the security community to the NSA spying scandal
  59. NSA leaker Edward Snowden is a hero to some, traitor to others
  60. FAQ: 5 things known and alleged about NSA surveillance
  61. Where cloud goes next
  62. New backdoor malware 'KeyBoy' used in targeted attacks in Asia, researchers say
  63. Android Trojans spread by Bluetooth, hijack bank codes
  64. European Parliament delays vote on sharing passenger data with US authorities
  65. MIT researchers advance cloud security with end-to-end encyrption
  66. Lawsuit filed over NSA phone spying program
  67. The art and science of risk management
  68. Most enterprises have no information strategy
  69. IT consumerization still a threat
  70. ACLU asks spy court to release records on Patriot Act surveillance powers
  71. Washington Free Beacon website redirects to malware
  72. Researchers find self-propagating Zeus variant
  73. How businesses prepare for disasters
  74. Big data is a big priority
  75. Mobile application reputation service from Veracode
  76. Cyber threat hunting service from Dell SecureWorks
  77. QualysGuard Private Cloud Platform on VCE Vblock Systems
  78. OS X Mavericks to have 200+ new features
  79. NSA whistleblower reveals himself, world reacts
  80. Event: OKTANE13
  81. Potential privacy problems for companies accepting Bitcoins
  82. Video with NSA whistleblower Edward Snowden
  83. Prism leaker steps forward, cites 'massive surveillance machine'
  84. Automating vendor risk management and certification processes
  85. QualysGuard Express Lite released
  86. When Google isn't Google, (Mon, Jun 10th)
  87. EU to vote on stiffer penalties for hackers
  88. New expert-level cyber forensics certification
  89. Microsoft Citadel takedown ultimately counterproductive
  90. Week in review: NSA spying scandal, EU net neutrality, and vulnerable smart TVs
  91. Dell adds identity to the classification of unstructured data
  92. The future of online authentication
  93. Larry Page: US government has no access to information on Google servers
  94. NSA snooping bolsters opponents of U.S. Internet control
  95. Negligence and glitches create 64% of data breaches
  96. Privacy tradeoffs are inevitable to keep nation safe, Obama says
  97. Data breach costs rise again: report
  98. Huawei deal with BT shows 'disconnect' over national security policy, MPs say
  99. Privacy groups, some lawmakers rip into NSA surveillance
  100. Conservative activist files lawsuit over NSA surveillance
  101. NSA, FBI mining data directly from major Internet companies, report says
  102. FAQ: What the NSA phone snooping uproar is all about
  103. New Android Trojan app exploits previously unknown flaws, researchers say
  104. Proposed bill will deny foreign hackers entry into the U.S.
  105. New Android Trojan is complex as Windows malware
  106. Google ups (some) bug bounties
  107. Exim/Dovecot exploit making the rounds, (Fri, Jun 7th)
  108. Changes to the standard for PIN Transaction Security
  109. Pirate Bay founder suspected of hacking police databases
  110. NSA has direct access to Google, Facebook, Apple servers
  111. Bill aims to discourage nations from sponsoring cyberattacks
  112. Android antivirus products a big flop, researchers say
  113. Hacker publishes alleged zero-day remote code execution exploit for older Plesk versions
  114. US intelligence chief defends surveillance programs
  115. Reports: NSA, FBI collecting content from Google, Facebook, other services
  116. Businesses told to give up data when NSA calls
  117. Scope of NSA's phone data snooping is 'breathtaking'
  118. NSA legally forces Verizon to hand over all phone records on a daily basis
  119. Backup and recovery problems exposed
  120. What are users doing after log-in?
  121. Event: HITBSecConf2013 - Malaysia
  122. Secure Windows desktops by removing administrator privileges
  123. Microsoft to release five bulletins next week
  124. Tripwire includes web application scanning with IP360
  125. Rogue employees, malware exploits and unauthorized software
  126. 100% Compliant (for 65% of the systems), (Fri, Jun 7th)
  127. Plesk 0-day: Real or not?, (Fri, Jun 7th)
  128. PHP patches - see http://www.php.net/ChangeLog-5.php - fixes CVE2013-2110, (Fri, Jun 7th)
  129. U.S. Veterans Affairs Dept. repeatedly targeted by foreign hackers
  130. ISC patches publicly disclosed denial-of-service vulnerability affecting BIND 9
  131. Hot cloud products IT pros swear by
  132. Bitcoin payments could be a landmine for companies
  133. Smart TVs vulnerable to a host of attacks
  134. Google Chrome has been updated to version 27.0.1453.110, (Thu, Jun 6th)
  135. NSA legally forces Verizon to hand over all phone records on a daily basis
  136. Brown University CISO on education, BYOD and emerging threats
  137. Mobile security incident costs, regional threat differences revealed
  138. Microsoft, US feds disrupt Citadel botnet network
  139. Report: Secret court order gives US access to Verizon call records
  140. Chinese 'NetTraveler' hackers stole data from 350 organisations, says Kaspersky Lab
  141. Malware increasingly uses peer-to-peer communications, researchers say
  142. Online ring for trading in stolen credit card data busted
  143. Not the Mobile Antivirus You Were Looking For
  144. Fake Mt. Gox pages aim to infect Bitcoin users
  145. Microsoft and FBI disrupt global cybercrime ring
  146. Most small businesses can't restore all data after a cyber attack
  147. Google researcher publishes Windows 0-day exploit
  148. Not the Mobile Antivirus You Were Looking For
  149. Cloud security for Windows, Android and iOS
  150. Google researchers publish Windows 0-day exploit
  151. Is data fragmentation putting businesses at risk?
  152. BIND 9 Update fixing CVE-2013-3919, (Wed, Jun 5th)
  153. Wireshark 1.10.0 Stable Released http://www.wireshark.org/download.html, (Wed, Jun 5th)
  154. Windows 8.1 bolsters biometrics for authentication
  155. Researchers find Java users woefully tardy on patching
  156. Apple fixes irritating Mountain Lion bugs, firms up Java defenses
  157. Mac OS X 10.8.4 fixes iMessage ordering issue, more
  158. Review: Bad Data Handbook
  159. Windows 8.1 will allow locking folders with a finger
  160. Most businesses experienced a mobile security incident
  161. The need for a collaborative effort against cybercrime
  162. Internet-savvy Turkish protesters turn to anti-censorship apps
  163. Cyberespionage campaign 'NetTraveler' siphoned data from hundreds of high-profile targets, researchers say
  164. Researchers find Java users woefully tardy on patching
  165. Exclusive research: IT commits to cloud computing
  166. Possibly related DDoS attacks cause DNS hosting outages
  167. Spyware sold to foreign governments aimed at U.S. woman critical of Turkish movement
  168. Net neutrality soon to be on EU's agenda
  169. Cyberespionage campaign targeting government-affiliated organizations
  170. Apple releases OS X 10.8.4
  171. Managed services for web, cloud and mobile app security
  172. Solution for Active Directory-based single sign-on
  173. Online password manager for business
  174. Damballa now detects malicious P2P communications
  175. Windows Sysinternals Updated http://technet.microsoft.com/en-us/sysinternals/default.aspx, (Wed, Jun 5th)
  176. Google biometrics tests show there's no magic pill for passwords
  177. FBI warns car buyers against scammy online deals
  178. E-voting system used in French election is flawed
  179. Our Mac Team Wants Beta Users
  180. Web developer devises new phishing trick
  181. Defending against exploit kits
  182. Plugging network leaks
  183. Malware going retro in 2013, security firm finds
  184. Maine may be first state to require a warrant for cellphone tracking
  185. Changes to the Java security model
  186. U.S. judge orders Google to share user info with the FBI
  187. The rise of the Koobface social networking worm
  188. Deloitte acquires Vigilant's cyber security services business
  189. The enterprise security time bomb
  190. Security software market grew 7.9% in 2012
  191. LinkedIn unveils optional 2-step verification
  192. Google won't allow facial recognition on Glass
  193. Knowing where to look for the owner of an offending IP address, (Mon, Jun 3rd)
  194. McAfee sees surge in spam, Koobface samples, MBR attacks
  195. What Google, Facebook and Twitter are doing right with website security
  196. Google nixes Glass facial recognition due to privacy concerns
  197. Exploit Sample for Win32/CVE-2012-0158, (Sat, Jun 1st)
  198. Security analytics will be the next big thing in IT security
  199. 7 things you can do to make Internet Explorer more secure
  200. Google zero-day disclosure change slammed, praised
  201. Oracle's Java security improvements don't quite satisfy
  202. LinkedIn aims to keep hackers out with two-factor login
  203. Oracle reveals plans for Java security improvements
  204. Largest ever DDoS attack directed at financial firm, Prolexic reports
  205. Beware of Android Defender mobile scareware
  206. Police and FBI must return seized materials to Kim Dotcom
  207. VMware releases new and updated security advisories, (Fri, May 31st)
  208. Becoming a computer forensic examiner
  209. Software vendors should respond to actively attacked vulnerabilities within seven days, Google says
  210. Dropbox goes down for more than an hour
  211. Mobile phone security no-brainer: Use a device passcode
  212. Motorola is working on electronic tattoos and authentication pills
  213. Questioning Google's disclosure timeline motivations
  214. Employees continue to use risky apps on mobile devices
  215. Amazon launches sign-in service
  216. Parents should be concerned about app security
  217. University of Illinois CS department machines compromised
  218. ISACA releases guide for performing business-relevant assessments
  219. Real-time identity alerts reduce fraud losses
  220. Apache server bug allows remote code execution
  221. University fined $400,000 after disabled firewall put medical records at risk
  222. Twitter SMS authentication security won't stop attacks, say experts
  223. When malware strikes: How to clean an infected PC
  224. Online money laundering bust casts light on Bitcoin
  225. Timely malware: How spammers turn a profit from our misfortune
  226. Microsoft plugs security systems into its worldwide cloud
  227. Reveton 'police virus' malware still being used by multiple gangs
  228. Evernote rolls out 2-factor authentication for paying customers
  229. Profiling modern hackers: Hacktivists, criminals, and cyber spies
  230. Drupal resets account passwords after detecting unauthorized access
  231. FAQ on global supply-chain security standard to prevent IT tampering, counterfeiting
  232. McAfee offers business endpoint security suites for broader protection
  233. F-Secure Globe
  234. Microsoft moving bot-busting fight to the cloud
  235. How Top CIOs Tackle Big Data, Analytics and Cloud Security
  236. Amazon Web Services integrates with Google, Facebook for easier logins
  237. Signature-based endpoint security on its way out
  238. Phishing gang jailed for plundering woman's $1.6 million life savings
  239. Decryption disclosure doesn't violate Fifth Amendment, judge rules in child **** case
  240. Private retaliation in cyberspace a 'remarkably bad idea'
  241. Migration and monitoring of Microsoft environments
  242. Google defines disclosure timeline for actively exploited bugs
  243. Drupal.org forces password reset following breach
  244. The social smart lock of the future
  245. Automate your way out of patching hell
  246. GFI Software buys online backup vendor IASO
  247. Drupal.org & group.drupal.org password disclosure, (Thu, May 30th)
  248. Chinese army announces drill to test its digitalized forces
  249. Running Snort on VMWare ESXi, (Wed, May 29th)
  250. Judge orders **** suspect to decrypt his hard drives