View Full Version : Security News

  1. Man gets 50 months in prison hacking U.S.-based financial institutions
  2. Hacking Team hacked, 400GB+ of company documents and emails leaked
  3. The best way to prevent data breaches? It's not what you think
  4. You've been breached, now what?
  5. Week in review: Popular VPNs leaking data, and the new issue of (IN)SECURE Magazine
  6. Data-centric security with RightsWATCH
  7. Mastercard is trying out purchase verification with selfies
  8. How you can anonymously use public Wi-Fi from miles afar
  9. Plex forums hacked: IPs, private messages, encrypted passwords compromised
  10. You've been breached, now what?
  11. Amazon releases new, easily auditable TLS implementation
  12. Harvard University suffers IT security breach
  13. Cloned, booby-trapped Dark Web sites steal bitcoins, login credentials
  14. How safe is Windows 10 Wi-Fi password sharing feature?
  15. A closer look into the piracy ecosystem
  16. Rise in DDoS reflection attacks using abandoned routing protocol
  17. Updated Point-to-Point Encryption standard now provides more flexibility
  18. Multi-link network encryptor with 100 Gbps encrypted bandwidth
  19. Researchers point out the holes in NoScripts default whitelist
  20. 4,900 new Android malware strains discovered every day
  21. NIST revises security publication on random number generation
  22. Why vulnerability disclosure shouldn’t be a marketing tool
  23. Security concerns continue to dog the cloud industry
  24. Event: IP EXPO Europe 2015
  25. Event: (ISC)2 Security Congress
  26. Major Xen update fixes over 20 vulns, including guest/host escape flaw
  27. Hackers are exploiting Magento flaw to steal payment card info
  28. Update your Flash Player if you don't want ransomware
  29. Week in review: TLS security, malicious Tor exit nodes, how to find a free, secure proxy service
  30. 5 ways to stop the Internet of Things from becoming the Internet of Thieves
  31. Update you Flash Player if you don't want ransomware
  32. Event: McAfee FOCUS 15
  33. Why a low-level threat can open the door for serious infections
  34. Researcher tests Tor exit nodes, finds not all operators can be trusted
  35. Vegan and BeEF clash shows how cyber arms race never stops
  36. Facebook slowly fine-tuning its popular ThreatExchange
  37. How companies can regain consumer trust after a data breach
  38. Cisco finds, removes more default SSH keys on its software
  39. Energy security pros: More competent, or just naive?
  40. How to survive a compliance audit
  41. The cloud, FedRAMP and FISMA compliance
  42. Expedia users targeted by phisher who gained access to their info
  43. Nigerian scammers are stealing millions from businesses
  44. Samsung disables Windows Update, undermines the security of your devices
  45. The downfall of a major cybercrime ring exploiting banking Trojans
  46. Businesses know about POS security risks, but are they investing wisely?
  47. Hackers are spending a huge amount of resources targeting financial services
  48. Three simple ways to prevent a data breach
  49. Why a Dyre infection leads to more than just stolen banking credentials
  50. WikiLeaks publishes reports showing NSA spied on French presidents
  51. Instapaper for Android vulnerable to man-in-the-middle attacks
  52. Over $18 million lost to Cryptowall just in the US
  53. Who fixes the most vulnerabilities?
  54. Six key facts about malicious macros and the cybercrime economy
  55. Review: Penetration Testing With Raspberry Pi
  56. How lack of trust and limited knowledge impact your organization
  57. Flash Player 0-day exploited in the wild, patch immediately!
  58. US, UK spies reverse-engineered security software in search for flaws
  59. HP releases exploit code for IE zero-day that Microsoft wont patch
  60. Critical RubyGems vulns can lead to installation of malicious apps
  61. TLS security: What really matters and how to get there
  62. Connected cars: Are tomorrows drivers at risk?
  63. OPM hack shines light on abysmal state of US federal systems's security
  64. How to find a free, secure proxy service?
  65. Cyber attack grounds Polish LOT aeroplanes
  66. New password recovery scam hitting Gmail, Outlook and Yahoo Mail users
  67. Open source security projects get $452,000 from the Linux Foundation
  68. Many popular Android apps fail to encrypt login credentials
  69. The state of cyber security in Thailand
  70. Week in review: Rethinking security, LastPass breach, and stronger data protection rules for Europe
  71. Linux container security and certification concerns remain
  72. How to evaluate the efficiency of a Data Loss Prevention solution
  73. How engaged is the average board when it comes to security?
  74. New Drupal versions fix admin account hijack flaw
  75. Static encryption keys affect SAP security
  76. EFF delves into privacy practices of Apple, Google, Twitter, and others
  77. Relying on your insurer for security? Think again!
  78. Microsofts anti-surveillance website was hacked
  79. Why LinkedIn chose to keep its bug bounty program private
  80. Reddit announces switch to HTTPS-only
  81. Insider threat: A crack in the organization wall
  82. IoT developers concerned about privacy and data protection
  83. Why break in, if you can simply login?
  84. Unpatched OS X, iOS flaws allow password, token theft from keychain, apps
  85. Lets Encrypt CA to issue its first cert
  86. Zero Trust approach to network security
  87. 86.2 million phone scam calls delivered each month in the U.S.
  88. Risks from fraudulent mobile apps and unauthorized app stores
  89. Exposing cyberattacks targeting government networks in Southeast Asia
  90. Keyboard app bug puts millions of Samsung mobile users at risk, researcher claims
  91. Emulating the security analyst with software
  92. Newly patched Flash Player bug exploited to deliver crypto ransomware
  93. Reactions to the LastPass breach
  94. Stolen Foxconn certs used to sign malware used in Kaspersky Lab attack
  95. Google announces reward program for Android bugs
  96. Trojan uses steganography to hide itself in image files
  97. How trustworthy are the worlds leading websites?
  98. A call to researchers: Mix some creation with your destruction
  99. 90% of companies benefit from Big Data
  100. LastPass breached, hashed master passwords compromised
  101. Emojis instead of PIN codes as an alternative for forgetful users
  102. Rethinking security: Securing activities instead of computers
  103. Stronger data protection rules for Europe
  104. OPM hack: Vast amounts of extremely sensitive data stolen
  105. Does the UK need to do more to address the threat of nuclear terrorism?
  106. Malware attacks give criminals 1,425% return on investment
  107. How data-centric security works
  108. Week in review: Windows 10 security, developing honeypots, IoT security holes
  109. Microsoft flags Ask toolbar as unwanted and dangerous
  110. New OpenSSL versions squash LogJam bug
  111. Instilling a culture of cyber security
  112. Privacy profession: An equal playing field for men and women?
  113. Trojanized Sberbank mobile app lurking on third-party stores
  114. FIRST announces CVSS version 3
  115. 153 machines still infected with Stuxnet
  116. Serious MitM flaw plugged in latest watchOS version
  117. Bug in iOS Mail app is a dream come true for phishers
  118. Does size matter when it comes to cybersecurity?
  119. IT admin errors that lead to network downtime and data loss
  120. DDoS attacks now resemble APTs
  121. How to develop effective honeypots
  122. Mozilla increases rewards given out to bug hunters
  123. Kaspersky Lab reveals cyberattack on its corporate network
  124. On Windows 10, apps can actively defend users from malware
  125. Microsoft releases critical patches, improves IE security
  126. 49 suspected members of cybercriminal group arrested in Europe
  127. Swift adoption of cloud and mobile drives insider threats
  128. Hackers can tamper with medical drug pumps, leading to fatal outcomes
  129. Financial impact of SaaS storage breaches now $13.85 million
  130. Massive growth in new ransomware, malware targeting Adobe Flash
  131. 90% of DLP violations occur in cloud storage apps
  132. Users care about their privacy, but feel powerless to protect it
  133. iOS 9 will use 6-digit passcodes for enhanced protection
  134. IoT is full of gaping security holes, says Shodan creator
  135. Whats driving security budgets and technology purchases?
  136. The Firewall Buyers Guide
  137. Proactive FISMA compliance with continuous monitoring
  138. Social media security is still a low priority
  139. Entrust Datacard integrates with Citrix to enable secure anytime-anywhere productivity
  140. Antiquated environment and bad security practices aided OPM hackers
  141. MalumPoS can be customized to target different systems
  142. Most vulnerabilities on enterprise networks are two years old
  143. Windows 10: More security with non-stop patching
  144. Brains reaction to certain words could replace passwords
  145. Released: New version of REMnux Linux distro for malware analysis
  146. Week in review: Hiding exploit code in images, online summer travel scams, and Infosecurity Europe 2015
  147. Event: ICISSP 2016
  148. Personal info of 4 million US government workers compromised in OPM breach
  149. Online summer travel scams to watch out for
  150. 70% of breaches are detected by a third-party
  151. CSA releases tool for personal data legal protection
  152. Shadow IT is prevalent in government agencies
  153. Google releases new hub for managing security and privacy settings
  154. Access control and password management solution for privileged endpoints
  155. Discovering connections between attackers
  156. Microsoft will add SSH support to PowerShell
  157. Dyre banking Trojan infections more than doubled
  158. Shadow IT is prevalent in government agencies
  159. How to raise users expectations about security and privacy?
  160. Intel and VMware team up to provide advanced threat protection
  161. USA Freedom Act is just the beginning of the fight for privacy
  162. SourceForge hijacks popular accounts to distribute 3rd-party software
  163. Weak SSH keys opened many GitHub repositories to compromise
  164. IoT devices entering enterprises, opening company networks to attacks
  165. Infosecurity Europe 2015, expo floor, part two
  166. CipherCloud offers compliance advice regarding EU privacy laws
  167. Billions of email messages attributed to brands potentially fraudulent
  168. Cloud SaaS data protection strategies
  169. Infosecurity Europe 2015, expo floor
  170. 3-in-1 solution for enterprise management of privileged accounts and info
  171. Bug hunting without much tech knowledge or many tools
  172. Akamai and Trustwave unite to protect businesses from online threats
  173. Google releases new hub for managing security and privacy settings
  174. Employee credentials of half of European top 500 firms exposed online
  175. Malvertising infected millions of users in 2015
  176. Enhanced security for corporate information on mobile devices
  177. Future attacks: Hiding exploit code in images
  178. Check out data-centric security solutions at Infosecurity Europe
  179. 1 in 4 UK PCs infected
  180. New SANS course teaches infosec pros how to ruin attackers day
  181. Intelligent packet capture for increased network visibility
  182. Hackers stole personal info of over a million of Japanese pensioners
  183. Section 215 of the Patriot Act expired last night
  184. Facebook introduces end-to-end encryption for notifications
  185. Which malware lures work best?
  186. A fundamental shift in security spending
  187. Confusion regarding strategic defenses for network security
  188. Cookie warnings: Useless and bad for security?
  189. Reactions to the IRS hack that impacted 100,000 people
  190. Internet of Things: Whose data is it, anyway?
  191. Complex security solutions are exposing companies to risk
  192. If we want strong encryption, we'll have to fight for it
  193. Exposing the vulnerabilities in Oracle PeopleSoft applications
  194. The challenges of data classification
  195. Cybersecurity strategies and the boardroom
  196. Complex security solutions are exposing companies to risk
  197. Drone detection: What works and what doesn't
  198. Phishers register domain names, hammer traditional targets
  199. Total cost of average data breach reaches $3.8 million
  200. Reactions to the IRS hack that impacted 100,000 people
  201. Solving the cybersecurity challenges of smart cities
  202. How businesses can stem the flow of leaky data
  203. Researchers track Android users by collecting accelerator readings
  204. Internet of Things: Whose data is it, anyway?
  205. Massive campaign uses router exploit kit to change routers DNS servers
  206. 15,000 spam emails have hit the inboxes of Android users in recent days
  207. Why insider threats are succeeding
  208. Malware upsurge threatens millions of POS devices
  209. Millions of users installed malicious Minecraft apps from Google Play
  210. Travel smart: Tips for staying secure on the road
  211. Sniffing and tracking wearable tech and smartphones
  212. mSpy finally admits they've been hacked
  213. Account recovery via secret questions is a bad idea
  214. Isle of Man taxpayers' info leaked due to email error
  215. Android factory reset not enough to keep data secure
  216. Windows Live ID scam targets personal information
  217. Hacker leaks sensitive info of millions of Adult FriendFinder users
  218. Malware upsurge threatens millions of POS devices
  219. The importance of encryption and key management for security practitioners
  220. Keeping passwords safe from cracking
  221. A first aid kit for ransomware infections
  222. Most organizations value threat intelligence sharing
  223. Companies stay vulnerable to web attacks for far too long
  224. Personal info of 1.1M customers stolen in CareFirst breach
  225. The rise in false fraud alerts
  226. Newly disclosed Logjam bug might be how the NSA broke VPNs
  227. Bug in NetUSB code opens networking devices to remote code execution
  228. DDoS attacks double, old web application attack vectors still active
  229. Hackers breached subsea cable operator Pacnet's corporate IT network
  230. Can you afford to wait 197 days to detect a threat?
  231. South Korean minors to be monitored via smartphone spying apps
  232. New UK law says GCHQ agents cannot be prosecuted for hacking
  233. How much money do cyber crooks collect via crypto ransomware?
  234. Fake PayPal payment reversal notification leads to phishing
  235. Trojanized, info-stealing PuTTY version lurking online
  236. Address spoofing Safari bug opens door for phishing attacks
  237. The cybersecurity domino effect
  238. The importance of good threat intelligence
  239. Secure smart devices for the holiday season
  240. Rombertik's disk wiping mechanism is aimed at pirates, not researchers
  241. Penn State engineering network is taken offline following two cyberattacks
  242. Rogue GTA 5 mods carry password-stealing malware
  243. European Internet users urged to protect themselves against Facebook tracking
  244. There’s no security without trust
  245. Strengthening trust in a highly connected world
  246. Global black markets and the underground economy
  247. ISSA-LA to hold premier Los Angeles information security event
  248. Security firm publishes details, exploit code for Google App Engine flaws
  249. How Google handles "right to be forgotten" requests
  250. Google completes ban of extensions not in the Chrome Web Store