View Full Version : Security News



  1. How Facebook prevents account hijacking when old email addresses are recycled
  2. How-to guide to protecting yourself from electronic spying
  3. Ebola-themed emails deliver malware, exploit Sandworm vulnerability
  4. Widespread malvertising campaign targets high-profile sites, delivers ransomware
  5. 100 million cloud file analysis reveals shadow data threat
  6. Open source NAC solution PacketFence 4.5.0 released
  7. 40% of enterprise employees use personal devices for work
  8. ISSA launches professional development framework
  9. INTERPOL World launches partners program
  10. Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics
  11. Cyber skills shortage makes UK a soft target for hackers
  12. Attackers bypass Sandworm patch with new 0-day
  13. Event: DefCamp 2014
  14. Avast 2015 identifies vulnerable home routers
  15. Two exploit kits prey on Flash Player flaw patched only last week
  16. Apple warns about organized network attacks against iCloud users
  17. 10 tips for securing your future in the cloud
  18. Wanted: Testers For The Greatest Android App Ever
  19. Windows 0-day exploited in ongoing attacks, temporary workarounds offered
  20. Windows 0-day exploited in ongoing attacks, offers temporary workarounds
  21. Attackers change home routers' DNS settings via malicious code injected in ads
  22. Attackers change home routers' DNS setting via malicious code injected in ads
  23. Attackers change home routes' DNS setting via malicious code injected in ads
  24. Koler worm spreads via SMS, holds phones for ransom
  25. Think before you share that file
  26. 60% of Android attacks use financial malware
  27. Malware directs stolen documents to Google Drive
  28. 2FA: Google offers physical alternative to verification codes
  29. OS X Yosemite's Spotlight Suggestions: Privacy killer or not?
  30. Cloud adoption trends in European organizations
  31. Staples customers likely the latest victims of credit card breach
  32. What all major brands share in common with the Snappening
  33. Delivering malicious Android apps hidden in image files
  34. Small healthcare facilities unprepared for a data breach
  35. China executes MITM attack against iCloud and Microsoft account holders
  36. Hackers make companies' phones call premium-rate numbers, cost them billions
  37. OS X Yosemite comes with POODLE and Shellshock patches
  38. Week in review: POODLE bug, Microsoft patches a slew of 0-days exploited in the wild
  39. The Software Assurance Marketplace: A response to a challenging problem
  40. Infographic: A brief history of malware
  41. Tor Browser 4.0, Tails 1.2 are out
  42. Beware of Ebola-themed phishing, malware campaigns and hoaxes
  43. The impact of disconnected security strategies
  44. Targeted attack protection via network topology alteration
  45. EMEA threat landscape: APTs nearly doubled
  46. GFI Software redesigns WebMonitor 2015
  47. Linksys releases high performance 4X4 wireless AC router
  48. Easily exploitable Drupal bug can lead to total site compromise
  49. New OpenSSL updates fix POODLE, DoS bugs
  50. Review: Building an Information Security Awareness Program
  51. Facebook doubles bounties for bugs in ads code
  52. How security-wary retailers can prepare for the holiday season
  53. McAfee Next Generation Firewall integrates with key technologies
  54. Tips for mitigating the financial impact of identity theft
  55. Whitepaper: Smart Devices, Smart Security
  56. Cyber security coalition aims to change the game against malware
  57. Microsoft patches two more 0-days actively used by attackers
  58. Lessons learned developing Lynis, an open source security auditing tool
  59. 4 million UPnP devices may be vulnerable to attack
  60. POODLE vulnerability: The end of life of SSL 3.0
  61. RATs threatening democracy activists in Hong Kong
  62. Infographic: How to spot a phish
  63. New Linksys switch compliments WRT router
  64. Microsoft patches SandWorm 0-day
  65. Malicious YouTube ads lead to exploits, ransomware
  66. Russian espionage group used Windows 0-day to target NATO, EU
  67. Russian espionage group used Windows 0-day to target NATO, EU
  68. Personal info of 850k Oregon jobseekers potentially compromised
  69. Detecting cyber attacks in a mobile and BYOD organization
  70. Spammers spreading new Wolf of Wall Street scam
  71. Dropbox wasn't hacked, says leaked credentials are from unrelated services
  72. Poor password habits plague our digital lifestyle
  73. Infographic: 4 authentication definitions you should know
  74. Leaked Snapchat images came from third-party server
  75. Dropbox bug left some users without their stored files
  76. Flawed reused code opens zero-day in Cyanogenmod
  77. Bob and Alice Discover a Mac OPSEC Issue
  78. EU Commission and data industry to master Big Data
  79. Kmart confirms month-old data breach, payment card data stolen
  80. HP to revoke certificate that was used to signed malware
  81. Identifying deceptive behavior in user-generated content
  82. Week in review: Shellshock exploits, privacy breaches in Europe, and protecting charities online
  83. Companies still rely on outdated methods to keep secure
  84. Whitepaper: Making BYOD simple and secure
  85. The number of JPMorgan hackers' targets rises
  86. Backoff POS malware found at nearly 400 Dairy Queen locations
  87. Google reports on "right to be forgotten" requests
  88. Twenty five years of firewall innovation
  89. Microsoft to release nine bulletins
  90. WordPress most targeted CMS by hackers?
  91. A walk through Cyber Security EXPO 2014, part two
  92. Emma Watson leaked Facebook video delivers Trojans
  93. Aggressive Selfmite SMS worm variant goes global
  94. How Shellshock can be exploited over DHCP
  95. Privacy breaches in Europe
  96. Integrating IT security at the board level
  97. Information security experts: Act and protect charities online
  98. Rapid7 releases Nexpose Ultimate
  99. First secure external HDD with cloud management
  100. A walk through Cyber Security EXPO 2014
  101. Seven Destiny video game tactics that translate to cyber security
  102. 133 DDoS attacks over 100Gbps so far in 2014
  103. Bugzilla bug that could reveal other software flaws has been patched
  104. NCR ATM API Documentation Available on Baidu
  105. Infected ATMs give away millions of dollars without credit cards
  106. CryptoWall Updated to 2.0
  107. Windows 10 will not come with built-in keylogging capabilities
  108. How does spam affect your business?
  109. Android browser SOP bypass bug: Who's affected, and what to do?
  110. How can parents keep their children safe on the Internet?
  111. Every fifth Android user faces cyber attacks
  112. Apple updates XProtect to kill iWorm botnet threat
  113. Hackers exploit Shellshock bug, compromise Yahoo, WinZip servers
  114. ISACA releases Cybersecurity Fundamentals Certificate
  115. How consumers foot the bill for data breaches
  116. AT&T suffers another insider breach
  117. Week in review: JPMorgan Chase breach, iOS spyware, and BadUSB attack code
  118. Who's at risk of identity theft?
  119. Discover Cyber Security EXPO
  120. Exabeam announces user behavior security technology
  121. Who's at risk of identity theft?
  122. Xen bug behind Amazon, Rackspace cloud servers reboot revealed
  123. Destructive Android Trojan poses as newest Angry Birds game
  124. JPMorgan Chase breach confirmed, 83 million customers affected
  125. Rising interest in IT security careers
  126. CISOs troubled by complex issues
  127. The harsh realities of protecting businesses
  128. Attitudes and understanding of data protection across Europe
  129. Researcher release BadUSB attack code
  130. Adapting to the changing cloud
  131. CryptoWall updated to 2.0
  132. Researchers test EMET 5 protections, find them wanting
  133. Terms of Service
  134. New OS X backdoor malware roping Macs into botnet
  135. Local US cops distributing questionable, unsafe spyware to families
  136. Public Wi-Fi and lack of passwords lead consumer risks
  137. Modes of defense against security breaches in healthcare
  138. Unpatched systems and apps on the rise
  139. Jimmy Kimmel is the most dangerous cyber celebrity of 2014
  140. Free tool tracks DNS changes in DNS zone files
  141. NIST releases Smart Grid Framework 3.0
  142. California toughens breach notification law
  143. Researchers unearth Xsser mRAT, Chinese iOS spyware
  144. Joomla update fixes high risk bug that could lead to site compromise
  145. Google triples Chrome bug bounties
  146. Hackers indicted for stealing Apache helicopter training software
  147. Global DDoS attack numbers decline, attacks from China rise
  148. Insider incidents and high-profile crimes increasing
  149. Low confidence in breach prevention
  150. Consumers feel insecure using debit or credit cards
  151. Hong Kong protesters hit with malware, turn to "off-the-grid" chat app
  152. FBI will share its Malware Investigator portal with businesses
  153. Apple patches Shellshock bug in OS X
  154. People will do anything for free Wi-Fi
  155. Exploring today's top security concerns
  156. Security policy management in hybrid cloud environments
  157. The Crime-as-a-Service business model
  158. Seagate Surveillance HDD features recovery services
  159. CloudFlare offers free SSL encryption
  160. Bash Shellshock bug: More attacks, more patches
  161. PoS vendor confirms Jimmy Johnís breach was their fault
  162. Wordpress vulnerability database
  163. Trust in the cloud is at an all-time low
  164. Bash "Shellshock" bug: Who needs to worry?
  165. Are malware authors targeting people via marketing services?
  166. Malvertising attack techniques dissected
  167. 216 Jimmy Johnís stores affected in data breach
  168. Critical SSL flaw patched in Firefox, Thunderbird, Chrome
  169. Critical Bash bug opens Unix, Linux, OS X systems to attacks
  170. FBI warns of malicious insider threats increase
  171. Consumers increasingly blame companies for data breaches
  172. Five of the biggest data myths debunked
  173. UK employees targeted with fake policy violation emails
  174. jQuery.com compromised to serve malware via drive-by download
  175. Energy IT pros show surprising optimism
  176. How threats shape cloud usage
  177. Kali NetHunter turns Nexus devices into portable hacking tools
  178. Microsoft launches bug bounty program for Online Services
  179. Mitigations for Spike DDoS toolkit-powered attacks
  180. Training for CISSP and other (ISC)2 certifications
  181. We can fix security, but itís not going to be easy
  182. Companies becoming lax in managing BYOD risk
  183. Board practices regarding IT oversight and cybersecurity
  184. Top tips to protect systems against insider misuse
  185. Notice: Freedome v2.0.1 Issue on iOS 8
  186. jQuery.com compromised to serve malware via drive-by download
  187. Notice: Freedome v2.0.1 Issue on iOS 8
  188. Beware of Apple Wave microwave wireless charging hoax
  189. Minimizing privacy risks of location data collection
  190. Blackphone and Silent Circle announce bug bounty program
  191. High-volume DDoS attacks on the rise
  192. Mobile device security is sacrificed for workforce efficiency
  193. European banks and Europol join forces to fight cybercrime
  194. McAfee delivers new security suites
  195. Number of malicious eBay listings rises, accounts are hijacked
  196. CipherShed: A replacement for TrueCrypt
  197. Federal regulations on cyber security lead to revenue loss
  198. Payment card info of 880k Viator customers compromised
  199. Home Depot security was anything but, say former employees
  200. Every budget is now an IT budget
  201. Users trust mobile service providers more than employers
  202. Microsoft kills off its Trustworthy Computing Group
  203. Google will display Android devs' physical address
  204. Security pros don't know the number of cloud apps in their networks
  205. Apple drops the "warrant canary" from transparency report
  206. How to keep your contactless payments secure
  207. Simply Secure aims to make security technology usable
  208. Home Depot completes malware elimination in all U.S. stores
  209. With iOS 8, Apple won't be able to unlock phones for the police
  210. iOS 8 fixes bucketload of severe security bugs
  211. Ransomware Race (Part 4): Adult Content, Browlock's Staying Power
  212. Malicious eBay listings redirect users to phishing site
  213. Free tool simplifies SHA-2 migration for system administrators
  214. Security compliance is necessary for real-time mobile data access
  215. Hackers penetrated systems of key defense contractors
  216. Kit: The Essentials of IT Security
  217. Critical Android Browser bug threatens users' privacy
  218. Tinba Trojan targets major US banks
  219. Apple adds two-step verification for iCloud
  220. Bug bounty programs: The road to hell is paved with good intentions
  221. Macro based malware is on the rise
  222. How to talk infosec with kids
  223. 72% of businesses don't trust cloud vendors
  224. Review: Secure mobile messaging with Threema
  225. H1 2014 Threat Report
  226. Citadel malware becomes APT tool in newest hacking campaign
  227. XSS bug allows Amazon account hijacking
  228. Why do Apple's security questions still suck?
  229. Internet giants band together to improve open source programs
  230. Cisco unveils threat-focused next-generation firewall
  231. Internet giants band together to improve open source programs
  232. (IN)SECURE Magazine issue 43 released
  233. "Win Free iPhone 6" scams hit Facebook
  234. System failures cause most large outages of communications services
  235. Researcher creates exploit for compromising scammers' computers
  236. Google Apps scripts can be easily misused by scammers
  237. Freenode suffers breach, asks users to change their passwords
  238. Dragonfly malware targeting pharmaceutical companies
  239. Emerging cloud threats and how to address them
  240. Video: Reactions of engineers under GCHQ surveillance
  241. Week in review: Security experts discuss Apple Pay, Salesforce hit with targeted attack
  242. Best practices for skimming prevention
  243. 75% of mobile apps will fail basic security tests
  244. Event: International Conference on Information Systems Security and Privacy
  245. Review: Bulletproof SSL and TLS
  246. Ransomware Race (Part 4): Adult Content, Browlock's Staying Power
  247. Home Depot and Target attackers likely not the same
  248. Event: FloCon 2015
  249. Event: Security Forum 2015
  250. Yahoo's fight against US govt secret surveillance revealed