View Full Version : Security News

  1. Video training course: Penetration testing and ethical hacking
  2. How malware peddlers trick users into enabling Office macros
  3. ISIS operation security guide gives insight into group's cybersecurity practices
  4. How fake users are impacting business through acts of fraud and theft
  5. Exploit kit activity up 75 percent
  6. Anonymous goes after ISIS, aims to expose recruiters and sympathizers
  7. Point of Sale malware gaining momentum as holiday shopping season approaches
  8. Event: ENITSE Enterprise IT Security Conference & Exhibition
  9. Bug in Android Gmail app allows effective email spoofing
  10. Phishers are targeting millions of DHL customers
  11. Google debuts customized warning for social engineering sites
  12. Information security innovation and the fast-paced threat landscape
  13. Email is more secure today than it was two years ago
  14. Digitally signed spam campaign spotted delivering malware
  15. Rooted, Trojan-infected Android tablets sold on Amazon
  16. Ivan Ristic and SSL Labs: How one man changed the way we understand SSL
  17. Three indicted in largest theft of customer data from a U.S. financial institution in history
  18. Beware of Apple-themed phishing emails threatening to limit your account
  19. Stolen or lost devices and the risks of remote working
  20. Final TalkTalk breach tally: 4% of customers affected
  21. A new, streamlined version of Cryptowall is doing rounds
  22. IT priorities are changing: Cloud-first strategy to rise
  23. Sale of legitimate code-signing certs booms on darknet markets
  24. Trojanized versions of 20,000 popular apps found secretly rooting Android devices
  25. 11 zero-days uncovered in Samsung Galaxy S6 Edge
  26. Researchers map out hard-to-kill, multi-layered spam botnet
  27. Hard-hitting insights into global attacks targeting organizations
  28. Open source tool checks for vulnerabilities on Android devices
  29. Chimera crypto-ransomware is hitting German companies
  30. The growth of mobile malware and online banking attacks
  31. Stanford researchers identify potential security hole in genomic data-sharing network
  32. Researchers can identify people through walls by using wireless signals
  33. Most consumers believe cloud-based apps can be hacked
  34. Android infostealer masquerading as MS Word document
  35. China is the top target for DDoS reflection attacks
  36. Hackers put up for sale 13 million plaintext passwords stolen from 000webhost
  37. Most are unaware of the seriousness of medical data theft
  38. US Library of Congress makes tinkering with your car software legal
  39. The security communitys reaction as CISA passes US Senate
  40. How can we decide on surveillance and privacy when we can't see the whole picture?
  41. WhatsApp collects phone numbers, call duration, and more!
  42. TalkTalk breach: Attackers demand £80,000 for stolen data
  43. The top 6 scariest cloud security mistakes and how to avoid them
  44. Cloud-based vulnerability management: Top vendors in the field
  45. What should companies do after a wide-scale data breach?
  46. Nine arrested in UK investigation of criminal network defrauding bank customers
  47. Week in review: Criminals hacked chip-and-PIN system, secret code in printers allows tracking, and insecure WD self-encrypting hard drives
  48. Microsoft wants researchers to find bugs in .NET Core and ASP.NET, will pay
  49. 12 new malware strains discovered each minute
  50. Smart home security and privacy checklist
  51. Four things to know about new net neutrality rules
  52. New ransomware delivered via Windows Remote Desktop Services
  53. Apple pushes out critical security updates for OS X, iOS, watchOS, and other products
  54. WikiLeaks publishes documents stolen from CIA directors email account
  55. Think twice about Android root
  56. Back to the Future: How much of Marty and Doc's tech is a reality?
  57. Fitbit trackers can easily be infected with malware, and spread it on
  58. Tech support scammers start targeting users of Apple devices
  59. Tech-savvy users are actually the worst offenders
  60. Free PCI and NIST compliant SSL test
  61. Data dump points to a breach at Electronic Arts
  62. 1 in 4 organizations have experienced an APT
  63. IS hackers are attacking the US energy grid
  64. Secret code in color printers enables government tracking
  65. UK workers are significantly lacking in security awareness
  66. Facebook starts warning users of state-sponsored attacks against their accounts
  67. Emergency Flash update plugs zero-day exploited in the wild
  68. Internet of Things: Rethinking privacy and information sharing
  69. Cyber warfare fears spur US Navy to teach celestial navigation again
  70. Microsoft fixes critical flaws in all versions of Windows and Office
  71. Hackers are exploiting zero-day flaw in fully patched Adobe Flash
  72. UK, US law enforcement agencies disrupt Dridex botnet
  73. Global Internet experts reveal plan for more secure, reliable Wi-Fi routers
  74. The countdown to the EU Data Protection Regulation
  75. How to become a nightmare for cyber attackers
  76. Companies investing in cloud, security and Big Data are growing faster
  77. Secure networks are the key to unlocking A2P potential
  78. WiFi jamming attacks more simple and cheaper than ever
  79. America’s Thrift Stores breached by Eastern European criminals
  80. Android ransomware gets new, professional look thanks to Google’s Material Design
  81. Internet of Things: Connecting the security dots from application design to post-sale
  82. Review: Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
  83. Cybersecurity expectations: Myth and reality
  84. Compliance vs. cybersecurity: Insurers face competing priorities
  85. Thousands of Zhone SOHO routers can be easily hijacked
  86. Chinese hackers arrested at US request
  87. GnuPG 2.1.9 released
  88. Authentication bypass flaw in Netgear SOHO routers exploited in the wild
  89. Don't sink your network
  90. Theoretical computer science provides answers to data privacy problem
  91. LogMeIn to acquire LastPass for $125 million
  92. Apple boots some ad blockers from App Store to protect users privacy
  93. Which Android smartphones are most secure?
  94. Attackers compromise Cisco Web VPNs to steal login credentials, backdoor target networks
  95. Do attribution and motives matter?
  96. Most are concerned about security of healthcare data
  97. Top strategic IT predictions for 2016 and beyond
  98. New Toshiba CMOS image sensor improves recognition and authentication
  99. CIOs agree, IT is more complex than ever
  100. Fake Android apps bypass Google Play store security
  101. Former journalist faces 25 years in prison for article defacement
  102. Free tool to remove YiSpecter iOS malware
  103. Hackers breach firm whose tech is used in Samsung Pay
  104. Pen-testing drone searches for unsecured devices
  105. Photo: A walk through Cyber Security Europe 2015
  106. The average cost of cybercrime escalates to $15 million per organization
  107. The impact of digital business on information security
  108. How are businesses responding to cyber risks?
  109. Huawei 3G routers rife with flaws
  110. Wealth of personal data found on used electronics purchased online
  111. Amazon launches AWS web application firewall
  112. Previously unknown Moker RAT is the latest APT threat
  113. The price of the Internet of Things will be a vague dread of a malicious world
  114. How attackers attempt to infect organizations
  115. High prevalence of personal health information at risk
  116. Winnti groups attack platform is based on decade old malware
  117. Cisco disrupts major ransomware campaign that brought in $30M annually
  118. IP camera manufacturers force researcher to pull conference talk
  119. Google patches Stagefright 2.0 on Nexus devices
  120. Attackers take over org's OWA server, harvest domain credentials with malicious DLL
  121. T-Mobile customer data stolen from Experian already for sale
  122. Applying machine learning techniques on contextual data for threat detection
  123. Attackers prefer lower-bandwidth DDoS attacks
  124. Cybersecurity is being taken seriously around the globe
  125. Nuclear facilities are wide open to cyber attacks
  126. Top 5 Android Marshmallow enterprise security benefits
  127. Advertising malware affects non-jailbroken iOS devices
  128. Car hacking via compromised car diagnostic tools
  129. Prevention is the best cure for identity theft
  130. The changing role of the risk manager
  131. Week in review: The evolution of the CISO, a simple Gatekeeper bypass, and Stagefright 2.0
  132. Compromising Macs with simple Gatekeeper bypass
  133. Unexpectedly benevolent malware improves security of routers, IoT devices
  134. Personal info of 15 million T-Mobile USA customers stolen in Experian breach
  135. Fake PayPal app is going after German users' banking credentials
  136. With unprotected keys and certificates, businesses lose customers
  137. Exposing fraud behavior patterns associated with compromised identities
  138. Unsurprisingly, companies are not protecting personal information
  139. New, improved Ghost Push variants continue to target Android users
  140. Employee use of cloud services puts business data at risk
  141. Stagefright 2.0: A billion Android devices could be compromised
  142. Apple releases OS X El Capitan, patches passcode loophole in iOS
  143. 7 key global DDoS trends revealed
  144. Compromising Macs with simple Gatekeeper bypass
  145. The value of threat intelligence
  146. The barriers to cybersecurity research, and how to remove them
  147. Fragmented approaches to PKI don't always follow best practices
  148. CISOs are looking for more integration and automation
  149. 500 million users at risk of compromise via unpatched WinRAR bug
  150. Scammers use Google AdWords, fake Windows BSOD to steal money from users
  151. Attackers posing as legitimate insiders still an enormous security risk
  152. Companies leave vulnerabilities unpatched for up to 120 days
  153. Women represent only 10% of the infosec workforce
  154. File insecurity: the final data leakage frontier
  155. VBA malware is back!
  156. Too many vulnerable medical systems can be found online
  157. XOR DDoS botnet launching attacks from compromised Linux machines
  158. Do security flaws with life-threatening implications need alternative disclosure?
  159. Hilton, Trump hotel chains hit by PoS malware
  160. How to avoid data breaches? Start by addressing human error
  161. The evolution of the CISO in todays digital economy
  162. Chinese fraudsters are hijacking and misusing Uber accounts
  163. Oysters tablet comes preinstalled with Trojanized Android firmware
  164. Mobile ad network exploited to launch JavaScript-based DDoS attack
  165. Yahoo open-sources Gryffin, a large scale web security scanning platform
  166. How organizations can increase trust and resilience
  167. Is your network suffering from the trombone effect?
  168. Silent Circle launches Blackphone 2, delivering business and personal privacy
  169. Infographic: Devaluing data, fighting cybercrime
  170. Mapping the underground cybercrime economy in order to disrupt it
  171. Cisco releases tool for detecting malicious router implants
  172. Enhancing email security in Office 365
  173. GreenDispenser malware makes ATMs spit out cash
  174. Mobile payments data breaches expected to grow
  175. Free tool helps organizations respond to vulnerability reports
  176. Scandinavian users hit with fake post office emails, ransomware
  177. Vulnerabilities in security software leave users open to attacks
  178. The number of fingerprints stolen in OPM hack rose to 5.6 million
  179. Apple tackles the XcodeGhost crisis by removing apps, alerting devs and users
  180. Chinese promotion company hijacks Android devices around the world
  181. CUJO: Plug-n-play protection for all devices
  182. Healthcare industry sees 340% more security incidents than the average industry
  183. Free WordPress plugin for a password-free login
  184. Using external URL shorteners for internal needs may lead to sensitive data leaks
  185. Killing computer infrastructures with a bang!
  186. WD My Cloud NAS devices can be hijacked by attackers
  187. ENISA provides details on the complex cybersecurity exercise carried out in 2014
  188. Firefox 41 includes critical security updates
  189. Most gamers lack confidence in developers’ security safeguards
  190. NIST will award $3.6 million to projects designed to improve cybersecurity
  191. Facebook tries to help advertisers and users with new ad control options
  192. Number of XcodeGhost-infected iOS apps rises
  193. Exploit broker offers $1 million for reliable iOS 9 exploit
  194. Android SMS Trojans evolve, go after bank and payment system accounts
  195. Reactions to the XcodeGhost malware infecting iOS apps
  196. Malware-infected game discovered on Google Play, up to 1 million users at risk
  197. Are you ready for EMV?
  198. Millions of iOS users endangered by Trojanized apps from the App Store
  199. 26 vulnerabilities found in parental monitoring application
  200. AVG will sell user browsing and search info to advertisers
  201. Symantec fires employees who issued rogue Google certificates
  202. D-Link accidentally leaks code-signing certs in its firmware
  203. Data security for the borderless enterprise
  204. Information security: A key issue in the 2016 U.S. presidential campaign?
  205. Critical Bugzilla flaw allows access to unpatched vulnerability information
  206. State-sponsored cyberattacks linked to Russian intelligence gathering
  207. Information security: A key issue in the 2016 presidential campaign?
  208. Malicious SYNful Cisco router implant found on more devices around the globe
  209. Malware takes screenshots of the infected player’s virtual poker hand
  210. Top cloud security issue? Lack of visibility
  211. iOS 9 partially fixes critical, easily exploitable AirDrop bug
  212. 80% increase of malware on Windows devices
  213. Behind the scenes at BruCON, a European hacker conference
  214. New POS Trojan created by mixing code from older malware
  215. Big Data investments on the rise
  216. Microsoft details how Device Guard fights malware in Windows 10
  217. Persistent XSS flaw in SharePoint 2013 revealed, patched
  218. (IN)SECURE Magazine issue 47 released
  219. Android 5 bug allows attackers to easily unlock password-protected devices
  220. Container security concerns escalate
  221. Why background screening is vital for IT security
  222. 230,000 new malware samples detected each day
  223. Malicious router implants open permanent entry points into target networks
  224. Privacy International helps individuals find out if they were spied on by the GCHQ
  225. Do we need harsher penalties and enforced data breach detection measures?
  226. The rise of repeated "low and slow" DDoS attacks
  227. Industrial security awareness continues to remain low
  228. Encryption: Whose keys are they, anyway?
  229. Tor security improves as .onion becomes a special-use domain name
  230. Researchers find backdoor bug in NASA rovers' real-time OS
  231. New malware can make ATMs not give users card back
  232. Review: Next Generation Red Teaming
  233. Intel establishes automotive security review board
  234. The Lord of the Hacktivist Rings
  235. Apple complicates app sideloading in iOS 9 for increased security
  236. 63% in favor of encryption backdoors to respond to national security threats
  237. Vulnerability management embraces new functions
  238. PIN-changing, screen-locking Android ransomware
  239. US Energy Departments systems breached 159 times in four years
  240. Attack code for critical Android Stagefright flaw published
  241. Review: Encryptr: Open source cloud-based password manager
  242. Internet of Things: Security misconceptions, expectations, and the future
  243. Global cyber insurance market to grow to over $20 billion by 2025
  244. Aggressive tactics from DD4BC extortionist group revealed
  245. Cyberespionage group exploits satellites for ultimate anonymity
  246. Microsoft pushes out security updates, plugs holes actively exploited by attackers
  247. Security pros acknowledge risks from untrusted certificates but take no action
  248. New Android malware could inflict $250,000 of losses
  249. The White House sprints to lock down data
  250. 2015 saw 888 data breaches, 246 million records compromised worldwide