View Full Version : Security News

  1. European Central Bank blackmailed in wake of data breach
  2. Apple confirms iOS backdoors, researcher says explanation is misleading
  3. Six men charged in StubHub cyber-theft case
  4. The 25th anniversary of the firewall: Celebrating a new generation
  5. Infographic: 25 years of the firewall
  6. How organizations deal with BYOD and mobile security
  7. Intel unveils SSD Pro 2500 self-encrypting drives
  8. Whitepaper: 7 reasons to adopt SaaS for security
  9. Operation Emmental exploits holes in banking security
  10. Android Simplocker ransomware hits English-speaking users
  11. 40% of orgs running VMware still susceptible to Heartbleed
  12. Internet Explorer vulnerabilities increase 100%
  13. Facebook scams now lead to exploit kits
  14. Interest for SSL and PKI on the rise
  15. UK application security programs lagging behind US
  16. The psychology of phishing
  17. Event: International Conference for Internet Technology and Secured Transactions 2014
  18. How Nigerian cyber criminals have evolved
  19. Intentional backdoors in iOS devices uncovered
  20. How Nigerian cyber criminals have evolved
  21. Private contact, calendar sync service for Android
  22. Critical de-anonymization 0-days found in Tails
  23. 8 online safety rules for college-bound kids
  24. EFF releases Firefox, Chrome plugin to stop online tracking
  25. 3 in 10 consumers don't trust retailers with their data
  26. IT security training: Be proactive
  27. Whitepaper: BYOD security that works
  28. Metadata-hiding Dark Mail protocol soon to be reality
  29. EFF invites hackers to test, secure its Open Wireless Router
  30. Review: Computer Incident Response and Forensics Team Management
  31. Funny Facebook video scam leaves unamusing Trojan
  32. Unpatched OpenSSL holes found on Siemens ICSs
  33. Event: BugCON Security Conference 2014
  34. Unpatched OpenSSL holes found on Siemens ISCs
  35. What does the future hold for cloud computing?
  36. TRUSTe launches new privacy assessments
  37. Mayhem malware ropes Linux, UNIX servers into botnets
  38. Mayhem malware ropes Linux, UNIX servers into lucrative botnets
  39. Fake Flash Player steals credit card information
  40. Government-grade malware used for ransomware attacks
  41. How hackers get in: Lessons from a network security audit
  42. Whitepaper: History of cryptography
  43. Seagate delivers five new NAS products
  44. Acunetix offers free network security scan
  45. Are endpoints the most vulnerable part of the network?
  46. 40% of IT security teams keep executives in the dark
  47. vBulletin releases patches for critical SQL injection flaw
  48. Botnets gain 18 infected systems per second
  49. Exposing the insecurity of hotel safes
  50. 63% of businesses don't encrypt credit cards
  51. Cisco fixes critical flaw in modems and wireless gateways
  52. Pushdo Trojan infects 11,000 systems in 24 hours
  53. New IP-based wireless networking protocol created
  54. 49% of security pros think Java apps are vulnerable to attacks
  55. Whitepaper: The value of perfect forward secrecy
  56. Unlocking the hidden value of information
  57. Cloud Security Alliance updates guidance documents
  58. vBulletin vulnerable to SQL injection
  59. UK data watchdog suffered data security breach
  60. Selectively re-using bad passwords is not a bad idea, researchers say
  61. Oracle delivers 113 updates
  62. Most dangerous superheroes to search for online
  63. 65 challenges that cloud computing poses to forensics investigators
  64. How email user habits impact personal life
  65. 100+ DDoS events over 100GB/sec reported this year
  66. Researcher launches SSL Blacklist
  67. Google goes to war against zero-days
  68. Breaches exposed 22.8 million personal records of New Yorkers
  69. PittyTiger APT group sells its services to companies
  70. CNET attacked by Russian hackers, user database stolen
  71. 96% of organizations hit by a security incident in the past year
  72. Active Directory flaw impacts 95% of Fortune 1000 companies
  73. NIST releases report on cryptography expertise
  74. CIOs should make digital business tech an IT responsibility
  75. Amazon-hosted malware triples in 6 months
  76. First aid kit for people who face digital threats
  77. Google testing new phishing and malware warnings
  78. Critical vulnerabilities in web-based password managers found
  79. Keyloggers found at hotel business centers, US Secret Service warns
  80. DoJ provides update on Gameover Zeus and Cryptolocker disruption
  81. Global action targeting Shylock malware
  82. Raspberry Pi B+ adds connectivity and power features
  83. Endpoint security myths and why they persist
  84. Week in review: Google catches India with fake certificates, and the risks of selling used smartphones
  85. Kit: Essentials of virtualization
  86. IoT privacy tech working group announced
  87. CryptoLocker is temporarily disabled, users still at risk
  88. Securing the virtual environment
  89. Empowered Millennials expect BYOD
  90. Businesses are deprioritizing information security
  91. Exploring the BYOD security dynamic
  92. Checklist: Should I use Linux?
  93. Consumers don't trust any industry with their personal data
  94. The emergence of the Digital Risk Officer
  95. Event: i-Society 2014
  96. Global rise in Android banking and payment malware
  97. Review: Penetration Testing: A Hands-On Introduction to Hacking
  98. Google catches India with fake certificates
  99. 1 in 5 enterprises experienced an APT attack
  100. Big Data security mistakes, tips and tricks
  101. Global cloud services market to reach $555 billion by 2020
  102. 64% of companies expect cyber attacks
  103. Trojan:W32/Lecpetex: Bitcoin miner spreading via FB messages
  104. Light Patch Tuesday fixes six issues, two critical
  105. DPAPI vulnerability allows intruders to decrypt personal data
  106. Risks of selling used smartphones
  107. GFI MailEssentials gets new AV engine and anti-spam capabilities
  108. Cloud security threats, tips and best practices
  109. Dispelling the myths behind DDoS attacks
  110. Security weakness found in WiFi enabled LED light bulb
  111. Travelers targeted by infected travel websites
  112. Exploring the mobile security landscape
  113. Why IAM will be worth over $10 billion by 2018
  114. Security weakness found in WiFi enabled LED light bulb
  115. Microsoft to address six issues on Tuesday
  116. Connecting cloud storage services and cloud-based data loss prevention
  117. Estimated $3.75bn stolen by Brazil fraud ring
  118. Do you take your coffee with "Free" Wi-Fi?
  119. Spammers are always thinking up new tricks
  120. Microsoft supports open source software framework for IoT
  121. No-IP reclaims control of domains seized by Microsoft
  122. Microsoft disrupts malware networks and APT operations
  123. Legitimate No-IP users still affected by Microsoft's domain takeover
  124. The building blocks of a successful authentication infrastructure
  125. Live open source security lab coming to Cyber Security EXPO
  126. eBook: Advanced Malware Exposed
  127. Android HijackRAT poised to hit mobile banking users
  128. Exploit switches off Microsoft EMET's protection features
  129. "Secure" UK hotel booking site leaking customer data
  130. Bug in WordPress plugin allows unauthorized file upload
  131. Microsoft hardens encryption for Outlook, OneDrive
  132. Legitimate No-IP users still affected by Microsoft's domain takeover
  133. Physical location of data will become increasingly irrelevant
  134. Facebook SDK flaw allows unauthorized access to Facebook accounts
  135. Geodo infostealer gets help from worm
  136. IEEE launches Anti-Malware Support Service
  137. Worldwide IT spending to grow 2.1 percent in 2014
  138. Western energy companies hit by state-sponsored hackers
  139. Microsoft disrupts malware networks and APT operations
  140. Number and diversity of phishing targets continues to increase
  141. Wireless security risks and defenses
  142. Whitepaper: Who's snooping on your email?
  143. 163k individuals affected in Butler Uni data breach
  144. How to build trust between business and IT
  145. DDoS attacks are becoming more effective
  146. Google Drive update fixes data-leaking flaw
  147. Google Drive update fixes data-leaking flaw
  148. Banking malware sniffs out data sent over HTTPS
  149. 5 essential mobile security tips
  150. The impact of IoT on IT infrastructure
  151. Gathering and using threat intelligence
  152. State of the Internet: Trends impacting online business
  153. Week in review: “Lawful interception” mobile malware, top infosec tech in 2014, and the new issue of (IN)SECURE Magazine
  154. Event: Hacktivity 2014
  155. How does a rogue ad network function?
  156. Germany cancels Verizon's government contract due to spying fears
  157. Exploiting wildcards on Linux
  158. Why security awareness matters
  159. The unlocked backdoor to healthcare data
  160. How old are today's networks?
  161. A look at Interflow, Microsoft's threat information exchange platform
  162. PayPal 2FA flow partially mitigated, accounts are safe
  163. You Are Responsible For Your Security And Privacy
  164. Critical Android code-execution flaw affects all but the latest version
  165. What's next: Advanced Evasion Techniques
  166. Cops must get a warrant before looking through cellphone content
  167. Business risk: Tales from the TrueCrypt
  168. Invasive Selfmite SMS worm uncovered
  169. Data breaches in 2013 exposed 14% of all debit cards
  170. eBook: The CIO playguide for secure BYOD
  171. Cryptome down, founder blames ISP
  172. 1.3M personal records exposed in Montana data breach
  173. Atypical cloned banking app pops up on Google Play
  174. Banking fraud campaign steals 500k euros in a week
  175. Drastic decline in vulnerable NTP servers due to Heartbleed?
  176. (IN)SECURE Magazine issue 42 released
  177. Companies are afraid of the cloud
  178. Top 10 technologies for information security in 2014
  179. Are CISOs too confident?
  180. Symantec addresses global workforce gap in cybersecurity
  181. Improperly anonymized taxi logs reveal drivers' identity, movements
  182. Capabilities of “lawful interception” mobile malware revealed
  183. Havex malware targets ICS/SCADA systems
  184. Mobile security and incident readiness
  185. Whitepaper: A guide to recovery options in Windows
  186. Who is ultimately responsible for data security in the cloud?
  187. Cybercriminals exploit trusted app and service vulnerabilities
  188. Cybercriminals exploit trusted app and service vulnerabilities
  189. Hackers to attack routers at DEF CON
  190. Card fraud impacts 1 in 4 consumers worldwide
  191. Dropbox-themed phishing is after multiple login credentials
  192. Google forks OpenSSL: BoringSSL will be used in company products
  193. Key Internet of Things privacy and security issues
  194. Skills development for information security professionals
  195. Spammers increasingly targeting Montreal
  196. Event: Cyber Security EXPO 2014
  197. Quarter of all UK attacks target web services and applications
  198. Cisco releases source code for experimental block cipher
  199. Week in review: GCHQ intercepts Google, Facebook users' communications, Code Spaces destroyed by extortion hack attack
  200. Improving transaction security for financial institutions
  201. Event: Deepsec 2014
  202. Event: BruCON 2014
  203. Event: Black Hat Europe 2014
  204. Critical flaw exposes admin passwords of nearly 32,000 servers
  205. TrueCrypt developer says forking the software is impossible
  206. Are your third-party vendors leaving the door open to hackers?
  207. Demand for PaaS on the rise
  208. Court decides bank is not to blame for $440k cybertheft
  209. Code hosting Code Spaces destroyed by extortion hack attack
  210. Bitcoin miner lurking on Facebook
  211. The future of cloud computing
  212. Scan of Google Play apps reveals thousands of secret keys
  213. Identity theft consequences and tips to stay secure
  214. Authorization model for home automation
  215. Most European businesses face a tech deficit
  216. Sir Tim Berners-Lee to open IP EXPO Europe
  217. ISC StormCast for Thursday, June 19th 2014
  218. Would you run potentially malicious programs in return for a dollar?
  219. Windows XP, slow to die :-( , (Wed, Jun 18th)
  220. VMSA-2014-0006.2 updates OpenSSL libraries in VMWare, (Wed, Jun 18th)
  221. ISC StormCast for Wednesday, June 18th 2014
  222. Bro 2.3 released - new here:, release notes here:, (Tue, Jun 17th)
  223. New Security Advisories / Updates from Microsoft - Heads up for Next Patch Tuesday!, (Tue, Jun 17th)
  224. Canada's Anti-Spam Legislation (CASL) 2014, (Tue, Jun 17th)
  225. Password protected Zbot malware in the wild
  226. ISC StormCast for Friday, June 13th 2014
  227. ISC StormCast for Monday, June 16th 2014
  228. ISC StormCast for Tuesday, June 17th 2014
  229. Microsoft patches DoS flaw in its Malware Protection Engine
  230. Five steps towards cyber breach preparation
  231. GCHQ legally intercepts Google, Facebook users' communications
  232. Endpoint protection attitudes and opinions
  233. Android smartphones pre-installed with malware hit the market
  234. Remove Android ransomware for free
  235. GCHQ legally intercepts Google, Facebook users' communications
  236. Privacy, security most likely to drive consumer action
  237. Geospatial framework for cybersecurity
  238. Whitepaper: Extended Validation SSL Certificates
  239. SMBs still use Windows XP and face security risks
  240. Hacker nets over $600k by compromising NAS systems to mine Dogecoin
  241. There's a new banking Trojan in town
  242. Java program to reverse Android ransomware damage
  243. Employees take too many risks with Wi-Fi security
  244. A new defense against kernel-mode exploits
  245. Could you maintain security in event of IT failure?
  246. Whitepaper: Six steps to securing your domains
  247. DEF CON contest to help track down illegal robocalls
  248. 600,000 customer details compromised at Domino’s
  249. Financial ransomware now targeting U.S. users
  250. 600,000 customer details compromised at Domino’s