- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Nov 2011
- Aug 2011
- Jun 2011
- Mar 2011
- Dec 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Apr 2006
Names, addresses, Social Security numbers and bank account numbers were published online.
The hackers defaced the site's main page with a statement alleging that admin passwords were stored in plain text.
Pornographic Web sites are less likely to be infected than religious, automotive or health sites, according to the company.
The breach occurred in December 2010, but was only recently uncovered by the company.
A simple process can reveal any Skype user's remote and local IP addresses.
Hackers have been offering to exploit the bug for as little as $20 per account.
The Rugged Operating System (ROS) comes with a static username and an easily identifiable password.
The forum was shut down after a hacker demonstrated the ability to access e-mail addresses and passwords.
Only 19,024 of 200,000 sites studied are 'genuinely secure,' according to the research results.
The company says the new version improves both scanning performance and malware detection rates.
The code for VMware ESX dates from the 2003 to 2004 timeframe, according to the company.
Luigi Auriemma says he came across the issue by accident while trying to play a practical joke on his brother.
In response to the findings, the ICO has published guidelines to help people delete all data from used hard drives.
Eugene Kaspersky says Apple has a lot of catching up to do.
The hackers redirected visitors to a page supportive of the country's president.
Russian-speaking cybercriminals doubled their annual income from 2010 to 2011, according to Group-IB.
According to Sophos, 20 percent of Macs are infected with Windows malware, while 2.7 percent are infected with Mac malware.
Six-month trials of five different security solutions are available in the company's Anti-Virus Marketplace.
A vulnerability could give attackers access to other users' data.
The center is aimed at helping the industry identify and remediate cyber attacks and threats.
The company says user IDs and hashed passwords were stolen.
The maximum bounty has been increased to $20,000.00.
All entrants' home and e-mail addresses were published online.
The new version, Flashback.S, doesn't request an administrative password prior to installation.
The companies will work together on research and development, and will make Lookout's security app available to Deutsche Telekom's customers.
The Iranian government has acknowledged that some data was stolen.
Sixty-one percent of survey respondents expect to be attacked by Anonymous within the next six months.
The proof-of-concept malware uses the device's motion sensors to steal passwords and other user data.
Vulnerabilities were patched both in the platform itself and in three external libraries.
The country was responsible for 9.3 percent of all spam between January and March of this year.
Christopher Lykes is accused of stealing 228,435 people's personal data, including names, phone numbers, dates of birth and Medicaid account numbers.
The action was taken to protest ongoing human rights abuses in the country.
The MedMon device is intended to protect wireless medical devices from cyber attacks.
Matt Weaver is accused of stealing approximately 700 students' user IDs and passwords in order to affect the results of an election for student body president.
Almost half of the attacks came from North America, according to BBC News.
Petr Murmylyuk is accused of causing $1 million in losses to brokerage firms, and stealing the identities of more than 300 people.
The AnonPaste service is based on the open source ZeroBin software.
Ten misplaced backup discs contained personal data on approximately 315,000 patients.
According to Kaspersky researchers, hundreds of compromised accounts are currently spamming as many as eight messages per second.
The sites appeared to be redirecting visitors to malicious Web sites.
The 15-year-old was caught when his anonymizing software failed.
The first exercises were held in Beijing last June, and in Washington last December.
The Trojan is being sold on underground forums for $280.
The security firm says the number of infected computers is now down to 140,000.
The malicious apps are being offered on Web sites that mimic the official Instagram site.
John Anthony Borell III faces up to 10 years in prison and a fine of $250,000.
The new variant stops the operating system from loading until a ransom is paid.
Higino O. Ochoa III posted a photo without purging the metadata -- which included the GPS location where the pic was taken.
The operating system scored well for its security, authentication, device wipe functionality, firewall and virtualization.
Personal information on almost 4,000 former students was mistakenly attached to an e-mail.
McAfee says the malware has already been downloaded by at least 70,000 users.
James Jeffery accessed the names, e-mail addresses and phone numbers of approximately 10,000 women.
The Trojan doesn't require any user interaction to infect a victim's machine.
A recent study found that 27 percent of respondents reported at least one security breach in the past 12 months.
Software engineer Jared Wein says the aim is to improve security, reduce memory usage, and open up the Web.
The latest Mac OS X Lion update also disables the automatic execution of Java applets.
The company says it's nearing the end of the development cycle and plans to launch the phone in late 2012.
The two teenagers were arrested by members of the UK's Police Central e-Crime Unit.
Intelligence sources say the virus was planted at the Natanz nuclear facility using a memory stick.
More than 80 percent of enterprise software applications built in-house use open source components that may contain vulnerabilities.
The company says HP 5400 zl series switches purchased after April 30, 2011 may be affected.
The Trojan connects to a remote Web site to download and install additional malware on the victim's device.
Some users are being required to select and answer three security questions before purchasing apps.
The updates patch a vulnerability that could be exploited to execute arbitrary code.
The company hasn't yet said when it expects the tool to be made available.
Researcher Paul Brodeur created a proof of concept app that was able to access system information, along with data on the device's SD card.
Prolexic says it mitigated more attack traffic in the first quarter of 2012 than it did in all of 2011.
The updates patch four vulnerabilities that could lead to arbitrary code execution.
The attacks were launched in protest of the organizations' support for CISPA.
The malware is designed to steal Ceridian users' IDs, passwords, company numbers and image-based authentication icons.
Brian Krebs reports that hackers are charging between $300 and $3,000 to modify a meter.
The state's Department of Technology Services says it will send letters to every person affected.
The group is threatening to launch similar attacks every Saturday.
The aim is to bring 20 women into Hacker School's 2012 summer session.
Two free tools are now available that make it easy to check for infection.
The group says the attack was launched in support of human rights and freedom of expression in Tunisia.
Names, e-mail addresses, business addresses, contact information and hashed passwords may have been accessed.
The malware can record phone calls, change network settings, upload the current GPS location, reboot the phone, and more.
'Hardcore Charlie' has published data on Pastebin and Photobucket.
Cody Kretsinger faces up to 15 years in prison.
The majority of the infected computers are located in the U.S. and Canada, according to Doctor Web.
Names, addresses and Social Security numbers may have been accessed.
Five key online forums were taken down two weeks ago by an apparent DDoS attack.
The vulnerability was discovered by UK app developer Gareth Wright.
Hacker Higinio Ochoa says eight FBI agents stormed his apartment on March 20.
A recent update patched 12 vulnerabilities, including one that was being actively exploited.
The free service includes daily recurring scans of any three pages of a domain.
The new version of the LeNa malware doesn't require any user interaction to gain root access.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?