View Full Version : Security News

  1. Email scammers stole $215M from businesses in 14 months
  2. Guidance to improve risk management and IoT
  3. How much can a DDoS attack cost your organization?
  4. Companies need to be custodians of customer data, not owners
  5. D-Link routers vulnerable to DNS hijacking
  6. Market share of antivirus vendors and products
  7. Swiss users inundated with malware-laden spam
  8. Reactions to the serious vulnerability found in Glibc
  9. Critical BlackPhone bug allows attackers to spy on users
  10. New OS X Yosemite version fixes critical security issues, including Thunderstrike
  11. How important is online privacy?
  12. Hijacking drones with malware
  13. 4 tips to make data protection everyone's business
  14. Multiple vulnerabilities in the FreeBSD kernel code
  15. IBM`s sophisticated cryptographic algorithm protects your identity
  16. Threats and technologies of a shifting data security landscape
  17. IoT security and privacy best practices
  18. High severity vulnerability found in Linux GNU C library
  19. Why Google won`t be updating pre-KitKat WebKit anymore
  20. Supposedly clean Office documents download malware
  21. APT gear: Custom Windows task hiding tool
  22. Employees would sell passwords for $150
  23. Video: Bruce Schneier talks to Edward Snowden
  24. What makes phishing emails so successful?
  25. VPN services blocked by China's Great Firewall
  26. How GitHub is redefining software development
  27. Police ransomware scam drives UK **** to suicide
  28. Adobe updates Flash Player again, plugs 0-day exploited by Angler
  29. How the Internet of Things impacts enterprise security
  30. Week in review: leaks user data, Angler kit exploits Flash 0-day, researchers recreate NSA's spying tools on the cheap
  31. Open source software for quantum information
  32. Event: Day-Con IX 2015
  33. Google discloses three OS X 0-days
  34. 79% of professionals do business on personal devices
  35. Critical Flash Player hole plugged, another still unpatched and exploited
  36. Why leaving a shared device unprotected is dangerous
  37. 5 tips for dealing with cyberbullying in education
  38. Click-fraud malware brings thousands of dollars to YouTube scammers
  39. Angler exploit kit goes after new Adobe Flash 0-day flaw
  40. Over a third of professionals do business on personal devices
  41. Why insider threat is thriving
  42. How health care providers can protect sensitive data
  43. Can the next EU regulation guarantee data protection for all?
  44. Researchers create inexpensive versions of NSA's spying tools
  45. 11% of Android banking and finance apps are dangerous
  46. GoDaddy fixes domain-hijacking vulnerability
  47. Reactions to President Obama`s 2015 State of the Union Address
  48. Oracle patches 169 vulns across its products, many are critical
  49. Infosec management strategies and the modern CTO
  50. Microsoft releases Sysmon 2.0
  51. SQL injection vulnerabilities surge to highest levels in three years
  52. UK GCHQ collected emails of UK, US journalists
  53. Hacker hits Australian travel insurer, leaks records of 800,000 customers
  54. Gamers hit with trojanized versions of official League of Legends releases
  55. Bold reform needed to strengthen U.S cybersecurity
  56. Cybersecurity readiness: Widening gulf between perception and reality
  57. Biometric authentication app downloads to reach 770 million by 2019
  58. North Korean networks compromised by NSA for a while now
  59. 2+ million US cars can be hacked remotely, researcher claims
  60. Lizard Squad’s DDoS website hacked, unencrypted customer database stolen
  61. Has the time come to give up penetration testing?
  62. Guide on actionable information for security incident response
  63. The rise of mercenary hacker crews offering Espionage-as-a-Service
  64. The cost of malware containment
  65. UK PM Cameron demonizes encryption, US report says it's vital
  66. Typosquatting abuse of 500 most popular websites analyzed
  67. Man arrested for Playstation and Xbox attacks
  68. 19,000 French websites hit by DDoS, defaced in wake of terror attack
  69. Home routers in Spain and Argentina sport critical vulnerabilities
  70. Hottest Snapchats scam spreads on Facebook
  71. One-click mobile fraud variant throws browser for a loop
  72. GFI adds multi server tools to mail security in MailEssentials 2015
  73. Pirate activist shows politicians what digital surveillance looks like
  74. Open source tool trawls Github repositories for sensitive data
  75. WhatsApp sees increasing complexity of spam campaigns
  76. Encrypted messaging and file storage app Peerio goes open beta
  77. Five key security, identity and access management trends
  78. New version of Cryptowall ransomware spotted doing rounds
  79. Beware of malware masquerading as Oracle security patches
  80. Cyber attacks demonstrated on autonomous ground vehicles
  81. Skeleton Key malware makes all passwords valid
  82. January`s Patch Tuesday marks the start of a new era
  83. GFI MailEssentials 2015: New security and patch management features
  84. Unfazed by Microsoft`s criticism, Google discloses another Windows 8.1 flaw
  85. US President spells out his cybersecurity legislative agenda
  86. Protecting personal data in the consumer product industry
  87. Over 930M Android users in danger as Google stops delivering critical patches
  88. Identity management trends in 2015
  89. Don’t look back in anger
  90. Corel DLL hijacking vulnerability could allow arbitrary command execution
  91. Ransomware-wielding crooks made over $217,000 in a single month
  92. OpenSSL release patches 8 vulnerabilities
  93. Security of data in the cloud now an executive-level concern
  94. Pre-Patch Tuesday alerts no longer publicly available
  95. Innovation must not come at the price of security
  96. FBI director confident North Korea was behind Sony hack, still offers no evidence
  97. State of the Internet: Attack traffic, DDoS, IPv4 and IPv6
  98. Compromised credentials in enterprise cloud apps
  99. Hackers use Pastebin to deliver backdoor code
  100. The coming shift in security
  101. Top fraud and corruption trends
  102. Top 3 reasons businesses should prioritize web security
  103. Top 3 reasons businesses should prioritize web security
  104. HuffPo visitors targeted with malvertising, infected with ransomware
  105. The one compliance lesson you need to learn
  106. NETGEAR ReadyNAS 200 enables data protection
  107. Kensington unveils thinnest security lock for ultrabooks and tablets
  108. Over $5 million confirmed stolen in Bitstamp hack
  109. Toshiba releases FlashAir III wireless SD card
  110. Moonpig shamed for not fixing customer data exposing flaw
  111. Four cyber security risks not to be taken for granted
  112. Bitcoin exchange Bitstamp suspends service in wake of compromise
  113. Review: Detecting and Combating Malicious Email
  114. Phish out WPA networks password with Wifiphisher
  115. Scandinavian banks hit with DDoS attacks
  116. Identity theft for dummies
  117. Number of cyber attacks on retailers drops by half
  118. The hidden dangers of third party code in free apps
  119. Infosec: More than reindeer games
  120. 5 working days left until the deadline for compliance with PCI DSS 3.0 kicks in
  121. Top Facebook scams and malware attacks
  122. Digital crime landscape in 2015
  123. Russian hackers stole millions from banks, ATMs
  124. Week in review: ICANN systems breached, critical Git and SOHO router flaws
  125. Actions to strengthen your defense, minimize damage
  126. Will 2015 be the year of risk-based security?
  127. Actions to strengthen your defense minimize damage
  128. Cybercrime will continue to evolve
  129. USBdriveby: Compromising computers with a $20 microcontroller
  130. New Zeus variant targets users of 150 banks
  131. Critical flaw on over 12M routers allows device hijacking, network compromise
  132. Cybercriminals won’t take a vacation this holiday season
  133. Critical Git flaw allows attackers to compromise developers' machines
  134. Smart grid security certification in Europe
  135. Your email, your data, your control
  136. Top 5 social media security predictions for 2015
  137. Researcher publishes JavaScript DoS tool
  138. Malware peddlers take advantage of Sony's decision to pull controversial film
  139. ICANN systems breached via spear-phishing emails
  140. Ars Technica readers urged to change passwords in wake of hack
  141. Review: Python Forensics
  142. Only 1% of consumers feel safe using mobile payments
  143. Worm Backdoors and Secures QNAP Network Storage Devices, (Sun, Dec 14th)
  144. GMail quirk used to subvert website spam tracking, (Wed, Dec 10th)
  145. Odd new ssh scanning, possibly for D-Link devices, (Wed, Dec 10th)
  146. Two VMWare Security Updates for vCloud Automation Center and Airwatch, (Wed, Dec 10th)
  147. Google starts blocking badly behaving Gmail extensions
  148. Malware peddlers turn again to malicious links
  149. Researchers confirm multiple Google App Engine security sandbox bypasses
  150. Tackling the growing web of data residency and privacy regulations
  151. Sony hackers threaten company and movie-goers
  152. Protecting the underground electronic communications infrastructure
  153. Top 5 malware attacks: 35 reused components
  154. Sony details employee data compromised in GOP hack
  155. TorrentLocker exposed: Investigation and analysis
  156. Attackers worm their way into QNAP NAS devices through Shellshock hole
  157. 76% of organizations have suffered a DNS attack
  158. How employees put your company at risk during the holidays
  159. 1 in 5 employees going rogue with corporate data
  160. Help Google design the Open Web of Things
  161. 100k+ WP websites compromised by SoakSoak malware
  162. GOP hackers announce more Sony data leaks for Christmas
  163. Two newcomers in the exploit kit market
  164. Week in review: POODLE targeting TLS, insider threats, and the new issue of (IN)SECURE Magazine
  165. Companies invested millions in privacy in 2014
  166. The problem with security shortcuts
  167. Web Application Firewall revenue to reach $777.3 million in 2018
  168. HIPAA security compliance: How risk tolerant are you?
  169. FIDO Alliance prepares for industry adoption of strong authentication in 2015
  170. Insider threats 101: The threat within
  171. Why now is the time for enterprises to implement context-based authentication
  172. Cloud security: Do you know where your data is?
  173. Big Data analytics to the rescue
  174. Payment gateway provider breached
  175. Do senior executives understand their role in data security?
  176. 10 strategies to protect patient information
  177. Security deficiencies that increase data breach risk
  178. Security trends you should NOT worry about in 2015, and five you should
  179. When should unauthorized computer access be authorized?
  180. Browser vulnerabilities to become biggest endpoint challenge
  181. Review: CSA Guide to Cloud Computing
  182. Corporate data: Protected asset or a ticking time bomb?
  183. Cyber attacks now longer than ever
  184. Microsoft released seven advisories, three are critical
  185. Linux backdoor used by Turla APT attackers discovered, analyzed
  186. Info of millions of AliExpress customers could have been harvested due to site flaw
  187. Inside the minds of senior security leaders
  188. Sony hackers apparently wanted money
  189. Cost of cybersecurity and risk management to double
  190. Trends in Internet trust exploits, IoT, cyber espionage and privacy
  191. POODLE attack now targeting TLS
  192. Home Wi-Fi security is as bad as PC security in the 90s
  193. Negotiating privacy in the age of Big Data
  194. 30+ bugs found in Google App Engine
  195. Internet freedom around the world is in decline
  196. Sony hack: Employees get threatening emails
  197. (IN)SECURE Magazine issue 44 released
  198. Software security in a market for lemons
  199. The rise of IoT 2.0 and the battle for the connected home
  200. What will create cybersecurity challenges in 2015?
  201. Week in review: Sony hack, turning kids into infosec heroes, and cybersecurity in 2015
  202. Free webinar: What’s new in ISO 27001 2013 revision
  203. Sony hack: Lousy security, customized malware linked to previous attacks
  204. Bebe Stores latest victim of a payment card breach
  205. RFID forensic evidence management
  206. US DOJ announces creation of a Cybersecurity Unit
  207. Complicated password rules diminish online shopping convenience
  208. Key trends in online spending
  209. Health insurance online threats revealed
  210. Microsoft to patch three critical issues
  211. Protecting your child's digital identity
  212. Pre-loaded malware on new Android phones is on the rise
  213. Top 3 security, privacy and data protection trends for 2015
  214. Internet of Things predictions for 2015
  215. Improving your readiness for OCR audits
  216. Best practices in knowledge-based authentication
  217. Google simplifies CAPTCHAs down to a single click
  218. Sony breach: More leaks expose employees' salaries, personal data
  219. Hackers hit execs for insider info to gain stock market advantage
  220. FBI issues warning on destructive malware
  221. Event: AppSec California 2015
  222. The 2014 Firewall Buyers Guide
  223. 2015 predictions: Cyber attacks aimed at critical infrastructure, Attacks as a Service
  224. New LusyPOS malware is a cross between Dexter and Chewbacca
  225. Firefox 34 comes with critical security updates
  226. Event: AppSec California 2015
  227. Event: Financial Cryptography and Data Security 2015
  228. Event: InfoSec World 2015 Conference & Expo
  229. FBI issues warning on destructive malware
  230. Hackers hit execs for insider info to gain stock market advantage
  231. Coordinated cyber attacks on global critical infrastructure exposed
  232. Data loss and downtime costs enterprises $1.7 trillion
  233. Training kids to become infosec superheroes
  234. Cyber attacks impact purchasing behavior
  235. Intel acquires digital identity manager PasswordBox
  236. Cybersecurity concept for unmanned systems
  237. Tens of thousands web servers backdoored via pirated CMS themes and plug-ins
  238. 118 arrested in action against online fraudsters in the airline sector
  239. The persistent threat of data breaches
  240. The dangers of Cyber Monday deals
  241. Online shoppers are easily duped
  242. Week in review: Regin spy malware, hacking RFID payment cards, and how to detect fraudulent activity in a cloud
  243. ENISA guidelines on cryptographic solutions
  244. If anything shouldn’t be taken for granted, it’s Information Security Management
  245. What to expect in the unpredictable world of IT security?
  246. Siemens pushes out emergency SCADA updates
  247. How to evaluate national cyber security strategies
  248. How to detect fraudulent activity in a cloud without invading users' privacy
  249. Preparing for an information audit
  250. Leveraging network intelligence and deep packet inspection