View Full Version : Security News

  1. mSpy finally admits they've been hacked
  2. Account recovery via secret questions is a bad idea
  3. Isle of Man taxpayers' info leaked due to email error
  4. Android factory reset not enough to keep data secure
  5. Windows Live ID scam targets personal information
  6. Hacker leaks sensitive info of millions of Adult FriendFinder users
  7. Malware upsurge threatens millions of POS devices
  8. The importance of encryption and key management for security practitioners
  9. Keeping passwords safe from cracking
  10. A first aid kit for ransomware infections
  11. Most organizations value threat intelligence sharing
  12. Companies stay vulnerable to web attacks for far too long
  13. Personal info of 1.1M customers stolen in CareFirst breach
  14. The rise in false fraud alerts
  15. Newly disclosed Logjam bug might be how the NSA broke VPNs
  16. Bug in NetUSB code opens networking devices to remote code execution
  17. DDoS attacks double, old web application attack vectors still active
  18. Hackers breached subsea cable operator Pacnet's corporate IT network
  19. Can you afford to wait 197 days to detect a threat?
  20. South Korean minors to be monitored via smartphone spying apps
  21. New UK law says GCHQ agents cannot be prosecuted for hacking
  22. How much money do cyber crooks collect via crypto ransomware?
  23. Fake PayPal payment reversal notification leads to phishing
  24. Trojanized, info-stealing PuTTY version lurking online
  25. Address spoofing Safari bug opens door for phishing attacks
  26. The cybersecurity domino effect
  27. The importance of good threat intelligence
  28. Secure smart devices for the holiday season
  29. Rombertik's disk wiping mechanism is aimed at pirates, not researchers
  30. Penn State engineering network is taken offline following two cyberattacks
  31. Rogue GTA 5 mods carry password-stealing malware
  32. European Internet users urged to protect themselves against Facebook tracking
  33. There’s no security without trust
  34. Strengthening trust in a highly connected world
  35. Global black markets and the underground economy
  36. ISSA-LA to hold premier Los Angeles information security event
  37. Security firm publishes details, exploit code for Google App Engine flaws
  38. How Google handles "right to be forgotten" requests
  39. Google completes ban of extensions not in the Chrome Web Store
  40. Sensitive customer data leaked following mSpy data breach
  41. Combating insider threats in the contact center
  42. Practical applications of machine learning in cyber security
  43. United Airlines offers air miles for vulnerability information
  44. US House of Representatives votes to stop NSA's bulk data collection
  45. WinYahoo adware changes your Chrome secure preferences
  46. Cloud security best practices during all phases of the infrastructure lifecycle
  47. New domains revive old spam
  48. Product spotlight: Qualys Continuous Monitoring
  49. Organizations lack control over mobile workspaces
  50. 11-year-old VM escape bug opens host machines to compromise
  51. BitTorrent releases free P2P private voice and text app
  52. Do ethics get in the way of security professionals?
  53. Scammers are draining payment cards linked with Starbucks customer accounts
  54. May Patch Tuesday delivers critical and important fixes
  55. Data breaches lead to surge of spoofing attacks
  56. The slow death of static security detections: Beginning of SIEM deployments
  57. Can you correctly identify phishing emails?
  58. Total data protection outside the firewall
  59. CIOs are distracted by the business of keeping the lights on
  60. Former employee claims cybersecurity firm extorted clients
  61. US Passport Agency contractor stole applicants’ data to steal their identities
  62. Cyber extortionists are hitting hedge funds
  63. Man charged with attempted spear-phishing attack on U.S. Department of Energy
  64. Angler EK pushes unnamed ransomware
  65. Increasing cloud adoption will drive IT innovation
  66. Product spotlight: Entrust IdentityGuard
  67. Tor Cloud project reaches the end of the line
  68. Do you know where your sensitive data lives?
  69. Flawed crypto endangers millions of smart grid devices
  70. Breaking Bad-themed ransomware targeting users
  71. Defend your network from APTs that exploit DNS
  72. IoT and the great data heist
  73. ThreatStream's approach to threat intelligence
  74. Week in review: Illegal surveillance, WordPress insecurity, cheap computer kill switch
  75. Data privacy endangered by international trade agreements
  76. Court declares NSA's domestic phone metadata collection program illegal
  77. To what extent companies digitally track our daily lives?
  78. GPU-based malware is real, say developers of PoC rootkit and keylogger
  79. Casino installs new POS equipment while investigating potential data breach
  80. Millions of WordPress sites risk hijacking due to flaw in default theme
  81. Researchers create searchable database of intelligence operators
  82. APTs: The fine balance of control and monitoring
  83. Workplace stress dramatically impacting IT professionals
  84. Top cyber attack vectors for critical SAP systems
  85. Classification and protection of unstructured data
  86. Lenovo makes new critical security mistakes
  87. Year-old flaw in popular WordPress plugin still actively exploited
  88. Company invokes DMCA to block researcher from disclosing flaws in its product
  89. The importance of data loss prevention for OS X
  90. Criminal attacks in healthcare are up 125% since 2010
  91. Cyber attacks aren't just targeting big business
  92. 72% of companies are not prepared for a data breach
  93. Windows 10 spells the end of Patch Tuesday
  94. Event: Seventh Annual Information Security Summit
  95. New AlphaCrypt ransomware delivered via Angler EK
  96. USBKill turns thumb drives into computer kill switches
  97. New infostealer tries to foil analysis attempts by wiping hard drive
  98. The risks of moving data into cloud and mobile environments
  99. Crimeware infects one-third of computers worldwide
  100. New Dyre variant outsmarts AV researchers sandboxes
  101. EllisLab servers breached by hackers wielding stolen admin password
  102. Mozilla pushes for full HTTPS use
  103. Las Vegas Hard Rock casino hit by carders
  104. Securing the smart grid: European Network of Cyber Security
  105. Social threat intelligence
  106. Product spotlight: Qualys Web Application Firewall 2.0
  107. Unnoticed for years, malware turned Linux and BSD servers into spamming machines
  108. Unnoticed for years, malware turned Linux and FreeBSD servers into spamming machines
  109. Researcher neutralizes Google's Password Alert with a few lines of code
  110. Fake "Account Locked" notices are delivering CTB-Locker
  111. CTO insights: Defending your organization from insider attacks
  112. Infosec: Don't fear the word
  113. The importance of integrating identity and data
  114. C-level executives are less confident than their boards or IT execs
  115. How secure are digital transactions?
  116. Impact of new data protection legislation not widely understood
  117. Barracuda fixes critical MITM flaws in its Web Filter
  118. Yahoo develops cheap, effective biometric smartphone authentication
  119. Crypt0L0cker ransomware avoids US computers
  120. Critical vulnerability in RealTek SDK breaks routers' security
  121. Chrome extension protects your Google account from phishers
  122. Emerging trends and targeted threat intelligence
  123. 93% of DDoS attacks last 30 minutes
  124. Unpatched, vulnerable PDF readers leave users open to attack
  125. 5,000+ e-commerce sites at risk due to buggy WordPress plugin
  126. Fraudsters steal millions from Ryanair account
  127. Why you should steer users towards less predictable passwords
  128. Tor Browser 4.5. is out, with new security and privacy upgrades
  129. Protecting and identifying your information assets
  130. Hacker exploits Android devices with self-implanted NFC chip
  131. Threats on government networks remain undetected for 16 days
  132. High volume DDoS attacks still persistent
  133. Researchers mount cyber attacks against surgery robot
  134. Police dismantle gang of online fraudsters and romance scammers
  135. Banking Trojan delivered to companies via macro-based malware
  136. Email delivery service SendGrid confirms data breach
  137. There's now a decryption tool for TeslaCrypt ransomware
  138. Big Data and analytics are changing the cybersecurity landscape
  139. Security still the top issue preventing payments investment
  140. Only 57% of critical IT infrastructure issues are detected before business impact
  141. The value of patching and how to do it properly
  142. A closer look at LepideAuditor for File Server
  143. NSA surveillance since Snowden revelations is strong as ever
  144. Lepide Exchange Migration Services launched
  145. Application manager that pleases both IT and the user
  146. Centrify launches cloud-based privileged identity service
  147. Planning for the Internet of Things
  148. WordPress vulnerable to yet another, still to be patched XSS flaw
  149. Successful POS attacks are the result of poor security, researchers find
  150. How Google saw the DDoS attack against Github and GreatFire
  151. The invasion of biometrics
  152. NSA surveillance since Snowden revelations is strong as ever
  153. Week in review: RSA Conference 2015, security guidance, mobile malware
  154. Lepide Exchange Migration Services launched
  155. Event: ENITSE Enterprise IT Security Conference & Exhibition
  156. Application manager that pleases both IT and the user
  157. SecureDoc Cloud removes security concerns related to cloud file sharing
  158. German intelligence agency helped NSA spy on EU companies
  159. Centrify launches cloud-based privileged identity service
  160. 70 bad exit nodes used in attack against Tor-based SIGAINT
  161. High-profile data breaches made most CEOs re-examine security programs
  162. Latest trends in the ransomware business
  163. Barracuda makes its NG Firewall manageable via iOS app
  164. 100,000 web shops open to compromise as attackers exploit Magento bug
  165. DDoS threat recognized by all members of the C-suite
  166. High-profile data breaches made most CEOs re-exam security programs
  167. Cyphort combines APT detection with lateral movement
  168. IBM brings cyber threat analytics to the cloud
  169. WordPress issues critical security release
  170. Network discovery and visibility for massive enterprise networks
  171. Card skimming gang stole 3M euros using ghost PoS terminals
  172. The ticking cybersecurity risk: Managing wearable tech in the workplace
  173. Banking botnets persist despite takedowns
  174. Vulnerability management for over 15,000 unique apps
  175. Smarter threats and the rising complexity of cybercrime
  176. Gemalto’s solutions challenge today’s security thinking
  177. BalaBit releases syslog-ng Premium Edition with Big Data support
  178. Mobile malware is like Ebola - an overhyped threat
  179. Waratek named Most Innovative Company
  180. Hacktivists are targeting law enforcement personnel, warns FBI
  181. Monitoring user activity in proprietary business-critical apps
  182. Protecting identities from the endpoint to the cloud
  183. White House cyber attackers linked to OnionDuke APT actor
  184. Popular WordPress plugins vulnerable to XSS
  185. Security industry has failed, its time to chart new course
  186. Knowledge base of malware intelligence enables rapid containment
  187. How attackers exploit end-users psychology
  188. Continuous monitoring of perimeter and internal IT assets
  189. Evasive malware goes mainstream
  190. Simplified VPN, web access for authorized users via push notification
  191. Qualys takes step towards complete automation of web app security
  192. Cloud agent platform for continuous IT asset inventory, security and compliance
  193. Apple Watch app for managing threat intelligence on-the-go
  194. Automated protection of enterprise email, docs and data
  195. Raytheon delivers end-to-end visibility to address cyber threats
  196. 1,500 iOS apps sport flaw that allows interception of sensitive user data
  197. Identity, data governance across all apps, systems, and devices
  198. One-in-four Americans victimized by information security breaches
  199. Making password databases impossible to steal
  200. Apples fix didnt close Rootpipe backdoor
  201. New fileless malware found in the wild
  202. IoT creates new set of risks, orgs embrace active defense
  203. Secure dynamic perimeters in cloud and hybrid environments
  204. How can organizations adapt to the rise in data breaches?
  205. New cloud security certification from (ISC)2 and CSA
  206. Ethical connected car hacking service launched
  207. Secure dynamic perimeters in cloud and hybrid environments
  208. How can organizations adapt to the rise in data breaches?
  209. New cloud security certification from (ISC)2 and CSA
  210. Ethical connected car hacking service launched
  211. Use of encryption continues to rise
  212. Fox-IT launches cyberthreat management platform
  213. Upatre malware gets full SSL comms encryption
  214. Valve tries to curb Steam scam accounts with new rule
  215. Security guidance for early IoT adopters
  216. Russian APT group actively exploiting Flash, Windows 0-day flaws
  217. Advanced threat detection platform leveraging distributed computing
  218. Organizations continue to rely on outdated technologies
  219. Radware launches hybrid cloud based WAF service
  220. The portable secure desktop: tVolution Mini
  221. Consumers think passwords are of no value to criminals
  222. Key trends and opportunities in the information security profession
  223. Five misunderstandings about cloud storage
  224. BlackVault CYNR: Code and document signing appliance
  225. Attackers actively downing Microsofts IIS web servers
  226. GitHub issues transparency report
  227. Exploit for crashing Minecraft servers made public
  228. How IT pros protect and investigate their endpoints
  229. Pawn Storm cyberspies still at work, target NATO and the White House
  230. 1 in 4 employees enable cloud attacks
  231. D-Links failed patch for DIR-890L router adds a new hole
  232. IBM unveils cyber threat intelligence sharing platform
  233. HSBC Finance Corporation confirms data breach
  234. Perception and reality of perimeter security effectiveness
  235. Cisco splats router bug that can lead to persistent DoS
  236. Dropbox launches bug bounty, will also pay for previously reported bugs
  237. TeslaCrypt ransomware pushed by several exploit kits
  238. Internet of Everything attack surface grows
  239. What IT skills are in demand?
  240. Perception and reality of perimeter security effectiveness
  241. New Java vulnerabilities remotely executable without login
  242. PCI DSS 3.1 released
  243. Attorney claims cops planted spying malware on drive containing evidence
  244. How can defenders gain advantage in the 0day market?
  245. Google blocks Java plugin in new Chrome by default
  246. Adobe fixes Flash Player zero-day exploited in the wild
  247. Microsoft releases 11 security bulletins
  248. New trend in cybercriminal activity: APT wars
  249. Lack of skilled infosec pros creates high-risk environments
  250. Key trends for risk-prone behavior in the workforce