View Full Version : Security News



  1. USBdriveby: Compromising computers with a $20 microcontroller
  2. New Zeus variant targets users of 150 banks
  3. Critical flaw on over 12M routers allows device hijacking, network compromise
  4. Cybercriminals wonít take a vacation this holiday season
  5. Critical Git flaw allows attackers to compromise developers' machines
  6. Smart grid security certification in Europe
  7. Your email, your data, your control
  8. Top 5 social media security predictions for 2015
  9. Researcher publishes JavaScript DoS tool
  10. Malware peddlers take advantage of Sony's decision to pull controversial film
  11. ICANN systems breached via spear-phishing emails
  12. Ars Technica readers urged to change passwords in wake of hack
  13. Review: Python Forensics
  14. Only 1% of consumers feel safe using mobile payments
  15. Worm Backdoors and Secures QNAP Network Storage Devices, (Sun, Dec 14th)
  16. GMail quirk used to subvert website spam tracking, (Wed, Dec 10th)
  17. Odd new ssh scanning, possibly for D-Link devices, (Wed, Dec 10th)
  18. Two VMWare Security Updates for vCloud Automation Center and Airwatch, (Wed, Dec 10th)
  19. Google starts blocking badly behaving Gmail extensions
  20. Malware peddlers turn again to malicious links
  21. Researchers confirm multiple Google App Engine security sandbox bypasses
  22. Tackling the growing web of data residency and privacy regulations
  23. Sony hackers threaten company and movie-goers
  24. Protecting the underground electronic communications infrastructure
  25. Top 5 malware attacks: 35 reused components
  26. Sony details employee data compromised in GOP hack
  27. TorrentLocker exposed: Investigation and analysis
  28. Attackers worm their way into QNAP NAS devices through Shellshock hole
  29. 76% of organizations have suffered a DNS attack
  30. How employees put your company at risk during the holidays
  31. 1 in 5 employees going rogue with corporate data
  32. Help Google design the Open Web of Things
  33. 100k+ WP websites compromised by SoakSoak malware
  34. GOP hackers announce more Sony data leaks for Christmas
  35. Two newcomers in the exploit kit market
  36. Week in review: POODLE targeting TLS, insider threats, and the new issue of (IN)SECURE Magazine
  37. Companies invested millions in privacy in 2014
  38. The problem with security shortcuts
  39. Web Application Firewall revenue to reach $777.3 million in 2018
  40. HIPAA security compliance: How risk tolerant are you?
  41. FIDO Alliance prepares for industry adoption of strong authentication in 2015
  42. Insider threats 101: The threat within
  43. Why now is the time for enterprises to implement context-based authentication
  44. Cloud security: Do you know where your data is?
  45. Big Data analytics to the rescue
  46. Payment gateway provider breached
  47. Do senior executives understand their role in data security?
  48. 10 strategies to protect patient information
  49. Security deficiencies that increase data breach risk
  50. Security trends you should NOT worry about in 2015, and five you should
  51. When should unauthorized computer access be authorized?
  52. Browser vulnerabilities to become biggest endpoint challenge
  53. Review: CSA Guide to Cloud Computing
  54. Corporate data: Protected asset or a ticking time bomb?
  55. Cyber attacks now longer than ever
  56. Microsoft released seven advisories, three are critical
  57. Linux backdoor used by Turla APT attackers discovered, analyzed
  58. Info of millions of AliExpress customers could have been harvested due to site flaw
  59. Inside the minds of senior security leaders
  60. Sony hackers apparently wanted money
  61. Cost of cybersecurity and risk management to double
  62. Trends in Internet trust exploits, IoT, cyber espionage and privacy
  63. POODLE attack now targeting TLS
  64. Home Wi-Fi security is as bad as PC security in the 90s
  65. Negotiating privacy in the age of Big Data
  66. 30+ bugs found in Google App Engine
  67. Internet freedom around the world is in decline
  68. Sony hack: Employees get threatening emails
  69. (IN)SECURE Magazine issue 44 released
  70. Software security in a market for lemons
  71. The rise of IoT 2.0 and the battle for the connected home
  72. What will create cybersecurity challenges in 2015?
  73. Week in review: Sony hack, turning kids into infosec heroes, and cybersecurity in 2015
  74. Free webinar: Whatís new in ISO 27001 2013 revision
  75. Sony hack: Lousy security, customized malware linked to previous attacks
  76. Bebe Stores latest victim of a payment card breach
  77. RFID forensic evidence management
  78. US DOJ announces creation of a Cybersecurity Unit
  79. Complicated password rules diminish online shopping convenience
  80. Key trends in online spending
  81. Health insurance online threats revealed
  82. Microsoft to patch three critical issues
  83. Protecting your child's digital identity
  84. Pre-loaded malware on new Android phones is on the rise
  85. Top 3 security, privacy and data protection trends for 2015
  86. Internet of Things predictions for 2015
  87. Improving your readiness for OCR audits
  88. Best practices in knowledge-based authentication
  89. Google simplifies CAPTCHAs down to a single click
  90. Sony breach: More leaks expose employees' salaries, personal data
  91. Hackers hit execs for insider info to gain stock market advantage
  92. FBI issues warning on destructive malware
  93. Event: AppSec California 2015
  94. The 2014 Firewall Buyers Guide
  95. 2015 predictions: Cyber attacks aimed at critical infrastructure, Attacks as a Service
  96. New LusyPOS malware is a cross between Dexter and Chewbacca
  97. Firefox 34 comes with critical security updates
  98. Event: AppSec California 2015
  99. Event: Financial Cryptography and Data Security 2015
  100. Event: InfoSec World 2015 Conference & Expo
  101. FBI issues warning on destructive malware
  102. Hackers hit execs for insider info to gain stock market advantage
  103. Coordinated cyber attacks on global critical infrastructure exposed
  104. Data loss and downtime costs enterprises $1.7 trillion
  105. Training kids to become infosec superheroes
  106. Cyber attacks impact purchasing behavior
  107. Intel acquires digital identity manager PasswordBox
  108. Cybersecurity concept for unmanned systems
  109. Tens of thousands web servers backdoored via pirated CMS themes and plug-ins
  110. 118 arrested in action against online fraudsters in the airline sector
  111. The persistent threat of data breaches
  112. The dangers of Cyber Monday deals
  113. Online shoppers are easily duped
  114. Week in review: Regin spy malware, hacking RFID payment cards, and how to detect fraudulent activity in a cloud
  115. ENISA guidelines on cryptographic solutions
  116. If anything shouldnít be taken for granted, itís Information Security Management
  117. What to expect in the unpredictable world of IT security?
  118. Siemens pushes out emergency SCADA updates
  119. How to evaluate national cyber security strategies
  120. How to detect fraudulent activity in a cloud without invading users' privacy
  121. Preparing for an information audit
  122. Leveraging network intelligence and deep packet inspection
  123. Adobe urges users to implement critical out-of-band Flash Player update
  124. Most people donít feel safe when shopping online
  125. The rise of account takeovers
  126. SaaS deployments are now mission critical
  127. Regin spy malware was used in Belgacom, EU government hacks
  128. New Docker version solves critical bugs, update immediately
  129. Sony Pictures hacked, blackmailed
  130. The context-aware security lifecycle and the cloud
  131. Why you should protect your wireless connection
  132. ISO 27001: An overview of ISMS implementation process
  133. Hacking RFID payment cards made possible with Android app
  134. Scammers used fake product listings to steal from Walmart
  135. Tips to avoid online scammers this holiday season
  136. Belgin backdoor: Sophisticated, stealthy, state-sponsored?
  137. Black Friday and Cyber Monday will put retailers under pressure
  138. Week in review: Critical WP bug allows site hijacking, WhatsApp gets end-to-end encryption
  139. Fighting malware, emerging threats and AI
  140. ENISA guidelines on cryptographic solutions
  141. Millions of WordPress websites in danger due to easily exploitable bug
  142. Hikvision DVRs sporting bugs that allow device hijacking
  143. Users of Remote Access Trojans arrested in Europe
  144. ITIL and ISO 20000 problem management
  145. User behavior intelligence in the expanding supply chain
  146. IE "Unicorn" bug actively exploited in the wild
  147. Using company devices for personal activities leads to data loss
  148. 6 tips for protecting your Internet-connected devices
  149. Financial services cyber trends for 2015
  150. Detekt government surveillance spyware on your computer
  151. Windows Kerberos bug: How to detect signs of exploitation before the update?
  152. OpenDNS and IRISSCERT partner to fight security threats
  153. Thousands fall for Free Audi R8 Facebook scam
  154. New Citadel variant is after your master password
  155. Review: Secure file storage and sharing with nCrypted Cloud
  156. 8 cybercrime trends that will shape IT
  157. How the threat landscape is shaping the network security business
  158. New Synology NAS optimized for encryption and intensive tasks
  159. Whitepaper: Zero Trust approach to network security
  160. Most IT pros prefer open source to proprietary software
  161. Sophisticated Android-based botnet a danger to enterprise networks
  162. Google open sources Firing Range, a test tool for web app security scanners
  163. Whitepaper: CISOs secret weapon for reducing enterprise risk
  164. New non-profit CA aims to make HTTPS use universal
  165. Does cyber insurance help the CISO get a seat in the boardroom?
  166. 320 breaches reported between July and September
  167. Malware Domain Generating Algorithms are becoming more sophisticated
  168. Overwhelming optimism for information security in 2015
  169. DDoS attacks continue to fall in size and frequency
  170. One billion attacks were blocked during the third quarter
  171. Does cyber insurance help the CISO get a seat in the board room?
  172. Open Whisper Systems helps WhatsApp achieve end-to-end encryption
  173. Critical factors in preventing data breaches
  174. Michaels and Staples breaches carried out by same attackers?
  175. One-in-four have been victims of identity theft
  176. Trojanized Android firmware found on inexpensive handhelds
  177. Top 5 fraud risk areas in the workplace
  178. TRUSTe deceived consumers through its privacy seal program
  179. Risk assessment benefits, best practices and pitfalls
  180. ReadyNAS OS offers 5 levels of data protection
  181. Suspected WireLurker creators and distributors arrested in China
  182. Attackers shellshock, take over devices running on BusyBox
  183. US State Department targeted by hackers
  184. Most of the top 100 paid Android and iOS apps have been hacked
  185. The 2014 Firewall Buyers Guide
  186. Malicious Tor exit node is run by MiniDuke APT actors
  187. How to become an ISO 27001 / ISO 22301 consultant
  188. Week in review: Obama backs net neutrality, Darkhotel espionage, working at Pwnie Express
  189. The evolution of threat detection and Big Data
  190. Default ATM passcodes still exploited by crooks
  191. Mobile Pwn2Own 2014: Windows Phone's sandbox resists attack
  192. Facebook updates terms and policies, introduces interactive privacy guides
  193. Job description: Infosec Ranger at Pwnie Express
  194. Toshiba and Cisco to collaborate on new ways to utilize IoT
  195. Enabling secure file sharing in the enterprise
  196. OnionDuke: APT Attacks Via the Tor Network
  197. Secure remote file access challenges
  198. Best practices for government agencies to secure IT infrastructure
  199. Shaping mobile security
  200. Review: ESET Smart Security 8
  201. Americansí privacy behaviors and attitudes in the post-Snowden era
  202. ISPs are removing encryption from customers' emails
  203. Microsoft open sources .NET server stack
  204. The most unpopular person in the room
  205. The biggest challenges around connected devices
  206. Report: Targeted digital threats against civil society organizations
  207. Latest Microsoft patches crucial for all Windows users
  208. What grade does your favorite app get?
  209. SAP finally patches critical, remotely exploitable bugs in GRC solution
  210. Do senior executives value information security?
  211. Organized cyber crooks plunder SMBs with simple, cheap keyloggers
  212. Microsoft patches Windows, IE, Word, SharePoint and IIS
  213. Infosec industry: Time to put up or shut up
  214. Many IT pros store compromising material on their mobile phones
  215. Whitepaper: Still using proxies for URL filtering? Thereís a better way
  216. Tips for a safe holiday season
  217. 73% of organizations say BYOD increases security risks
  218. First victims of the Stuxnet worm revealed
  219. German spy agency wants to buy and use 0-day bugs
  220. Personal info of 800,000 USPS employees compromised in breach
  221. How cybercriminals scam consumers during the holiday season
  222. Only 47% of IT pros are confident in their hardware configurations
  223. 8 criteria to decide which ISO 27001 policies and procedures to write
  224. New SDK for Raspberry Pi protects embedded software
  225. Vigilance and the Enterprise of Things
  226. Obama backs net neutrality, asks FCC to reclassify broadband as a utility
  227. BrowserStack hacked, but it's not shutting down
  228. While rare, manual account hijacking is more damaging
  229. China is building a quantum encryption network between Beijing and Shanghai
  230. A holistic approach to protecting intellectual property
  231. After Silk Road 2, global law enforcement seizes other dark markets
  232. Darkhotel espionage campaign targets corporate executives traveling abroad
  233. Fake malware-laden Amazon emails target UK, US shoppers
  234. Aligning risk analysis and IT security spending
  235. Application Threat and Usage Report 2014
  236. Internet of Things to reach 30 billion devices in 2020
  237. Week in review: Unprecedented iOS, OS X malware, secure messaging tech, Silk Road 2 takedown
  238. 53M customer email addresses were also stolen in Home Depot breach
  239. Brazilian, Chinese govt sites host the most phishing pages
  240. After Silk Road 2, global law enforcement seizes other dark markets
  241. WireLurker: Apple blocks Trojanized apps, revokes certificate
  242. Overcoming Big Data security obstacles
  243. Silk Road 2.0 shut down, operator arrested, charged
  244. Enterprises must prepare for attacks on supply chain and POS in 2015
  245. One in three Americans donít use basic malware protection
  246. EFF: Use VPN to avoid Verizon's tracking header
  247. INTERPOL World 2015 expects high-level international participation
  248. Cisco projects data center traffic will nearly triple
  249. Dridex-laden spam emails targeting First World bank users
  250. WireLurker: Unprecedented iOS, OS X malware hits users