View Full Version : Security News



  1. Critical flaw in WiFi routers puts hotels and millions of guests at risk
  2. Car hacking made cheaper and easier
  3. US tech giants urge Congress to curb mass digital surveillance
  4. "Free $20 Steam codes" offer leads to online surveys
  5. Researchers identify malware threat to virtual currencies
  6. Malware threat to virtual currencies
  7. Crowdsourcing your bug bounty program
  8. The multiple benefits of IT auditing
  9. Amazon Cloud Drive now with unlimited cloud storage
  10. Apple-themed "Your account has been limited" phishing emails doing rounds
  11. Xtube visitors redirected to exploit kit landing page
  12. How companies secure their cloud data
  13. Behavioral biometrics: The password you canít forget
  14. Huge spam operation on Twitter uncovered
  15. Data lurking: How to protect your company against overlooked insider threats
  16. Researcher finds backdoor opened by Dells helper app
  17. Multifunctional Vawtrak malware now updated via favicons
  18. Macro-based malware continues to gain traction
  19. 15,435 vulnerabilities across 3,870 applications were recorded in 2014
  20. Half of all Android devices vulnerable to installer hijacking attacks
  21. Implementing an effective risk management framework
  22. Mobile apps are not being tested for insecure behavior
  23. One in three top Alexa websites is risky
  24. Organizations have little control over privileged access
  25. Premera breach: Are HIPAA standards too low?
  26. Finalists announced for Innovation Sandbox at RSA Conference 2015
  27. Old Adobe Flex SDK bug still threatens users of many high-profile sites
  28. Full, cracked version of NanoCore RAT leaked, onslaught of infection attempts expected
  29. The average DDoS attack tripled in volume
  30. Twitch forces users to reset password in wake of breach
  31. UK consumers committed to mobile privacy
  32. Hack air-gapped computers using heat
  33. Sensitive data resides in the cloud
  34. Four advantages of an identity behavior-based approach to cybersecurity
  35. Fake "Incoming Fax Report" emails lead to crypto-ransomware
  36. Flaw in Hilton Honors website left all customer accounts wide open
  37. New PoS malware family comes with keylogger component
  38. Most parents donít know how to tackle cyber bullying
  39. Cisco Small Business IP phones vulnerable to eavesdropping
  40. Scammers use Whatsapp calling feature as a lure
  41. Tails 1.3.1 emergecy release fixes security issues
  42. Trumping cybercriminals during tax season: Tips on how to stay safe
  43. WordPress plugin used by millions sports critical site-hijacking flaw
  44. Fake job seekers emails deliver ransomware and info-stealer
  45. Bank of America phishing attack hits customers
  46. State-sponsored hackers target European, Israeli organizations
  47. Mobile app developers are not investing in security
  48. IT pros are taking action against the insider threat
  49. Why you shouldnt ignore change auditing
  50. OpenSSL security update less critical than expected, still recommended
  51. Polymorphic security warnings more effective than same, static ones
  52. Pinterest swaps T-shirts for money rewards in bug bounty program
  53. Windows 10 will let you log in with your face and fingerprint
  54. Smart cities to use 1.1 billion connected things
  55. Many admit that passwords are their only IT security measure
  56. Security risks of networked medical devices
  57. Google aims to make Play Store safer, sets up human app review team
  58. Do your attackers know your network better than you?
  59. Personal, healthcare info of over 11M Premera customers compromised
  60. Payments via Facebook Messenger soon to be a reality
  61. Many Android and iOS apps still vulnerable to FREAK attacks
  62. The need for information security innovation
  63. SSL Labs unveils free open source tool, new APIs
  64. Native Hadoop security tools are not enough
  65. Why senior managers need to be involved in data security
  66. A billion data records leaked in 2014
  67. Search for vulnerable servers unearths weak, thousands-times repeated RSA keys
  68. D-Link patches critical flaws in wireless range extender, Wi-Fi cameras firmware
  69. Deanonymizing Tor users with Raptor attacks
  70. Do smart machines require ethical programming?
  71. The Andromeda botnet is ballooning once again
  72. When it comes to cloud apps, companies are left in the dark
  73. What pokes holes in virtual environments?
  74. How Snowdens revelations affected Americans communication habits and online activities
  75. When it comes to patient data privacy, compliance and security differ
  76. Event: 12th CISO Summit & Roundtable Geneva 2015
  77. Exploit kits in 2015: What can we expect?
  78. Microsoft releases EMET 5.2
  79. Event: 12th CISO Summit & Roundtable Geneva 2015
  80. Yahoo announces email encryption plugin, password-free logins
  81. Students create open source, cross-platform memory scanning tool
  82. Online trust is at the breaking point
  83. Cutting-edge security research comes to Amsterdam
  84. Week in review: Shadow IT, crypto-ransomware goes after gamers, and the security of smartwatches
  85. Flaw in Dropbox SDK for Android lets attackers steal data sent to users' account
  86. Facebook worm spreads by leveraging cloud services
  87. Critical hole in popular WordPress SEO plugin allows SQLi, site hijacking
  88. Preventing fraud through enterprise password management
  89. Defending against PoS RAM scrapers
  90. How much pressure do infosec professionals face?
  91. Listen to your employees or deal with shadow IT
  92. Huge IT Slider WordPress plugin opens SQL injection hole
  93. New crypto-ransomware encrypts video games files
  94. CS:GO players targeted with phishing attempt, malware
  95. 2,400 unsafe mobile apps found in average large enterprise
  96. Cyber crooks take advantage of ad bidding networks to deliver ransomware
  97. Analysis of Equation Groups espionage platform discovers another link to the NSA
  98. How much pressure do infosec professionals face?
  99. False positive free online web application security scanner from Netsparker
  100. Free online web application security scanner from Netsparker
  101. When it comes to patient data privacy, compliance and security differ
  102. Microsoft patches flaw exploited by Stuxnet - again
  103. Flaw in Dropbox SDK for Android lets attackers steal data sent to users account
  104. Unpatched security vulnerabilities affecting Facebook
  105. Transport for London adopts ultra-secure USB drives
  106. Protecting healthcare records from cyber attacks is a game of cat and mouse
  107. Core Infrastructure Initiative kickstarts OpenSSL audit
  108. Apple Watch scams target Twitter and Facebook users
  109. Cloud security and adoption trends
  110. Microsoft patches Windows, IE, Office, SharePoint
  111. Smartwatches and corporate data
  112. Beware of fake invites for WhatsApps Free Voice Calling feature!
  113. Apple issued update for FREAK flaw in OS X and iOS
  114. Hacking Nest Thermostat
  115. Active campaigns deliver old and new ransomware families
  116. The Pentagon is looking to hire 3,000 infosec pros
  117. Hack yourself first: How we can take the fight to the black hats
  118. μTorrent comes bundled with crypto-miner, users are furious
  119. Three indicted for breaching Email Service Providers, monetizing stolen data
  120. Data classification ranks in top 3 security controls
  121. Seagate acknowledges NAS 0-day, announces patch for May
  122. UK: 57 arrested for cyber crime, including US DoD hacker
  123. A few small steps for man, a giant leap for online security
  124. Tired of paying for automated scanning and still seeing your website hacked?
  125. The C99Shell PHP backdoor lives on
  126. Fake "Flash Player Pro" update delivers password-stealing Trojan
  127. Windows vulnerable to FREAK attacks after all
  128. Cryptowall makes a comeback via malicious help files
  129. Expert tips to address third party security risks
  130. Adobe launches bug disclosure program, skimps on bounties
  131. Top priorities for internal audit professionals
  132. SanDisk InfiniFlash storage targets Big Data workloads
  133. Financial firms are putting more stock in the cloud
  134. NLPRank: An innovative tool for blocking APT malicious domains
  135. Anthem refuses comprehensive IT security audit after the breach
  136. Angler exploit kit and domain shadowing: A deadly combination
  137. Mandarin Oriental suffers credit card breach
  138. Fake guides and cracked apps on Google Play Books lead to malware
  139. What security tools do healthcare organizations lack?
  140. Banking Trojans target nearly 1,500 financial institutions
  141. How DDoS attacks impact service providers
  142. 5 tips to avoid identity theft
  143. New PoS malware family discovered
  144. US air traffic control system is riddled with vulnerabilities
  145. Beware of spyware concealed inside games
  146. FREAK bug breaks SSL encryption for Android and Apple devices
  147. Lepide Software launches LepideMigrator for Exchange
  148. 3 ways to advocate for data security at your company
  149. Third-party security now a top business concern
  150. A proactive approach to DDoS attack prevention
  151. Whats the most common security threat for an organization?
  152. How directors manage todays key challenges
  153. Flaw in GoPro update mechanism reveals users Wi-Fi passwords
  154. D-Link fixes critical router flaws
  155. Mass infection malware attack targets Android
  156. Signal 2.0: Cross-platform encrypted voice and text communication app
  157. Phishers target victims of iOS device theft
  158. HITB Haxpo: Connecting hackers, makers, builders and breakers
  159. Global experiment exposes the dangers of using Wi-Fi hotspots
  160. Security threats and the retail industry
  161. Exposing the organized crime of tomorrow
  162. Ubers on a hunt for the attacker that compromised its drivers database
  163. 0-day flaw in Seagate NAS devices endangers thousands
  164. Beware of malicious LogMeIn Pro Payment emails
  165. Netflix phishing website targeting European users
  166. A threat assessment of 7 million iOS and Android apps
  167. New versions of Tails and Tor Browser fix numerous security issues
  168. The shift to secure apps in the enterprise
  169. Mobile security market to reach $34.8 billion by 2020
  170. Compromised cPanel "Account Suspended" pages redirect to exploit kit
  171. Medical identity theft affected two million victims in 2014
  172. Critical vulnerabilities affecting SAP business critical apps
  173. Cyber attackers like to impersonate IT workers
  174. Security framework for governments deploying the cloud
  175. Aggressive adware in Google Play apps
  176. Freeware tool helps monitor privileged accounts
  177. Black hole routing: Not a silver bullet for DDoS protection
  178. Lenovo.com hijacking made possible by compromise of Webnic registrar
  179. Companies expects others to protect them against DDoS attacks
  180. Google scraps Pwnium, invites researchers to submit Chrome bugs year-round
  181. Healthcare security spending to reach US$10 billion by 2020
  182. Over a million of WP sites in risk of hijacking due to plugin bug
  183. Anthem breach affects millions of non-Anthem customers
  184. How safe are Android-based childrenís tablets?
  185. New DDoS attack and tools use Google Maps plugin as proxy
  186. 3 million strong RAMNIT botnet taken down
  187. Gemalto says NSA and GCHQ intrusions "probably happened"
  188. Researchers create automated signature compiler for exploit detection
  189. Addressing cybersecurity business disruption attacks
  190. Known weaknesses plague the security threat landscape
  191. Critical Samba flaw allows unauthorized remote code execution
  192. Google ups efforts to protect users against unwanted software
  193. Fake face aging app steals Facebook login credentials
  194. Internet of Things adoption is gaining momentum
  195. Continuous Diagnostics and Mitigation capability requirements need re-prioritization
  196. Mobile apps left vulnerable for months
  197. Superfish not the only app using Komodia`s SSL-busting code
  198. CTOs targeted with tax-themed phishing emails carrying malware
  199. Flaw in Cisco routing hardware makes it vulnerable to DoS attacks
  200. How important is the critical information infrastructure?
  201. 96% say ISO 27001 is important for improving security defenses
  202. Week in review: Gemalto SIM heist, Lenovo`s Superfish blunder, cyber spies compromising disk firmware
  203. Is the Internet hiding a crime wave?
  204. Lack of trust is affecting how consumers use the Internet
  205. Concerns around endpoint security
  206. Gemalto announces investigation of massive SIM heist
  207. Over 250,000 home routers sport same SSH keys, warns researcher
  208. Google's new Cloud Security Scanner detects common security bugs
  209. How to wipe Superfish adware and offending cert from your Lenovo laptop
  210. How cybercriminals hack our brains
  211. Donít wait until youíre attacked to take cybersecurity seriously
  212. Cyber readiness across government and critical infrastructure industries
  213. AT&T: Pay more if you dont want to share data for personalized ads
  214. New Android Trojan fakes device shut down, spies on users
  215. Endpoint security becoming critical focus area
  216. Darkleaks: An online black market for selling secrets
  217. Lenovo computers come with pre-installed adware and MITM proxy
  218. Lepide Exchange Recovery Manager 15.0 released
  219. Declaring personal data bankruptcy and the cost of privacy
  220. Getting your privacyís worth
  221. Visual hacking exposed
  222. 6 steps for effective rights management
  223. Endpoint security becoming critical focus area
  224. GnuPG 2.0.27 released
  225. Windows 10 will offer password-free authentication
  226. UK banks customers can access accounts with their fingerprint
  227. Certifying ICS/SCADA professionals
  228. Credit card info stolen in BigFish Games site compromise
  229. Beware of fake Facebook "Copyright Violations" warnings
  230. Arabic cyber espionage group attacking high profile victims
  231. Pwn2Own 2015: New rules, prizes, and potential problems
  232. Vawtrack malware peddlers turn to malicious macros
  233. Beware of fake Windows 10 "activators"
  234. Flaw in Netgear Wi-Fi routers exposes admin password, WLAN details
  235. Whats critical to the success of the Internet of Things?
  236. Hackers and makers to meet in Amsterdam at HITB Haxpo
  237. Equation Group: Cyber espionage, compromising HDD firmware, sophisticated malware
  238. Is there an overarching organization that helps Arab hackers?
  239. Carbanak cyber gang stole hundreds of millions from banks
  240. Banking Trojan Dyreza sends 30,000 malicious emails in one day
  241. Google relaxes its rigid 90-day bug disclosure period
  242. BYOD: Better stay used to it
  243. 1 billion data records compromised in data breaches
  244. Scammers pushing fake AdwCleaner in active scareware campaign
  245. How to enable two-step verification for iMessages and FaceTime
  246. 16 million mobile devices infected by malware
  247. 16 million mobile devices are infected by malware
  248. The limits of prevention-centric security programs
  249. Phishing attacks increasingly target financial data
  250. IT security training is a top priority for CIOs