- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Apr 2006
- Mar 2006
- Oct 2005
- Sep 2005
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
Many malware products are openly advertised through search engines like Baidu.com.
Jalil Hasan's laptop took screenshots and photographs of him for nearly two months.
Developers patched only 45 percent of the vulnerabilities that Microsoft's security team reported to them between July 2009 and June 2010.
The government may ban the BlackBerry service if its security concerns aren't resolved.
According to Barracuda Labs, Google distributes more than twice as much malware as Bing, Twitter and Yahoo! combined.
Administrators are urged to upgrade to versions 4.1.14, 4.2.13, 4.3.4 or 4.4.1.
A new email campaign delivers a generic keylogger Trojan.
The 2010 Verizon Data Breach Investigations Report states that malicious insiders were involved in 48 percent of security breaches.
The attack uses the familiar Firefox 'Just Updated' page to trick victims into downloading malware.
A Russian group has been using botnets to assist with counterfeiting checks in the US.
Version 5.0.1 of the browser patches the well-publicized vulnerability.
A recent report states that the Ministry of Defense lost more than 1,000 storage devices over the past two years, and most were not encrypted.
The Certificate of Cloud Security Knowledge is intended to ensure that those responsible for cloud computing are aware of key security issues.
According to University of Cambridge researchers, smart meters could allow hackers to control the gas and electricity supply grid.
Relatively few people who are victimized by rogue anti-virus scams dispute the charges.
Gary Locke has asked commercial, academic and public sector interests to submit ideas on improving security in the commercial sector.
Web sites including MTV, ESPN, ABC, NBC and others are accused of violating computer intrusion laws.
The open source project is designed to identify malware, including zero day exploits.
The drug store chain has reached a settlement over potential violations of the HIPAA Privacy Rule.
Secunia has discovered the flaw in the newest version of QuickTime 7 for Windows.
Anthony Scott Harrison infected 3,000 computers with a banking Trojan.
Chrome 5.0.375.125 patches seven vulnerabilities.
The security firm's App Genome Project has examined 300,000 Android and iPhone apps.
Juniper Networks will integrate SMobile Systems' security solutions into its Junos Pulse software.
The aim is to attract new talent to the IT security industry.
The emails ask players to click on a link in order to update their passwords.
Nearly 60 percent of all systems infected by the worm are located in Iran.
The company says hackers and Open Hack Days have proven to be important sources of new ideas and technologies.
The company is urging customers to upgrade to the latest version of its mobile banking application.
AirTight Networks researcher Md Sohail Ahmad discovered the exploit.
The site was hacked to protest the idea of applying a market-based approach to the problem of carbon emissions.
The government of the United Arab Emirates says the device is open to misuse.
The vulnerability in version 3.8.6 makes it easy to access sensitive data.
Eset researchers have uncovered two new types of malware exploiting the Windows shell LNK flaw.
The company says the browser's SmartScreen Filter has blocked 1 billion attempts to download malware.
WhiteHat Security's Jeremiah Grossman has found a flaw in Safari that could give hackers access to a user's personal information.
The majority of stolen credentials are sent to the kit's authors, not to the hackers using it.
The company won't say whether or not it was running anti-virus software at its factory.
Unlike Mozilla and Google, Microsoft says it won't be rewarding researchers who find bugs in the company's products.
Version 5.3.3 fixes approximately 100 bugs.
The two new products for Mac users are McAfee Internet Security and Family Protection for Macs.
A customer recently discovered the flaw in the bank's web site.
State officials say scammers are forging corporate identities to commit fraud.
The four suspects are accused of being involved in the development of the Mariposa botnet.
A series of attacks by hackers at 4chan recently made the blog intermittently unavailable.
The company has issued an advisory warning of a serious security hole in Cisco Internet Streamer.
If Information Systems Security is your game, earning a few top certifications can also earn you top dollar.
VeriSign's SSL certificates will now include an online malware scanning service that will help to determine if a website is at risk from security vulnerabilities.
The flaw resulted in the shutdown of PlayNow.com just hours after it was first launched.
Luis Mijangos has pleaded not guilty to extorting sexually explicit videos from female victims.
The company will now pay $3,133.70 for severe Chromium bugs.
The next version of Adobe Reader will implement sandboxing as an additional security measure.
The popular film is being used to attract victims to fake survey sites and pop-up software scams.
Although more and more security functionality is being built into these offerings, security-as-a-service still has its pros and cons.
Personal information on approximately 800,000 patients was recently lost.
The PowerEdge R410 Rack Server has spyware in its embedded systems management software.
The Suricata Engine is designed to be a replacement for Snort.
An unnamed German company was recently attacked by the Stuxnet worm.
Mozilla has patched 14 bugs in Firefox and six in Thunderbird.
Fresh from DARPA, Peter Lee will head up Microsoft's basic research organization.
A Deloitte venture capitalist believes cloud computing will force companies that have deferred investment to become more efficient by buying new systems, among other things.
The scam promises access to a video that will persuade viewers never to drink Coca Cola again.
Damn Vulnerable Linux is designed for learning and research.
BrowserCheck has been in development for almost 18 months.
The unnamed person has been charged with hacking into webcams to spy on schoolgirls.
The vulnerability was reported to Apple by Clint Ruoho of Laconic Security.
Researchers who report bugs in Mozilla's software will now receive a $3,000 cash reward.
According to Symantec, Coventry's spam rate leads the UK at 92.8 percent.
A Sophos survey has found that nearly half of UK businesses think the country's data protection laws are too relaxed.
The scam uses compromised sites for redirecting and hosting phishing pages.
The department recently began identiying entities that were previously listed only as 'private practice.'
The add-on, called Mozilla Sniffer, was designed to forward users' login data to a remote server.
The company plans to release a patch in August.
The company's security software mistakenly identified the news site as a phishing risk.
The hackers are accused of defacing the web sites of Spain's two leading political parties and of a popular TV gossip show.
The report details the steps the US government is taking to protect against cyber attacks.
The malware leverages a flaw in the way Windows handles shortcut files.
The vulnerabilities could be used to compromise a user's system.
Zeus is specifically targeting US banking customers via Verified by Visa and MasterCard SecureCode.
Researchers have discovered three attacks that can be launched against Chatroulette users.
The company is suing Symantec, McAfee, Websense, Sophos and Webroot Software over patents related to anti-virus products and security services.
The solution is designed to help companies identify the riskiest file share assets in their organization.
The main range of IP addresses used by PegasHosting has been null-routed.
The companies plan to develop integrated security products for cloud and on-premise use.
The two vendors have announced plans to integrate their software suites.
The vulnerability can give users the ability to edit files for which they only have read privileges.
The latest version of the Zeus toolkit targets the login details of Spanish, German, UK and US bank customers.
The emails, which contain a malicious attachment, claim to confirm the recipient's purchase of a Sony Bravia television.
The malware disables applications on the affected PC, then demands 30 Ukrainian Grivna for an unlock code.
The Department of Homeland Security is now responsible for overseeing federal agencies' compliance with FISMA.
A recent survey found that owners of geolocation-capable mobile devices are worried about a loss of privacy as a result of geotagging.
The patches fix vulnerabilities in hundreds of the company's products.
BlackBerry Protect gives consumers access to advanced security functionality.
The country's privacy commissioner says Google's Street View cars broke Australian law.
The woman posed as another parent, asking to have that parent's child removed from a school's waiting list.
The Pakistani government recently announced the arrest of five leaders of the PAKBugs hackers forum.
The Electronik Tribulation Army had been harassing a security researcher involved in Jesse William McGraw's arrest.
Lenny Zeltzer designed the REMnux OS for reverse engineering malware.
Barracuda Labs researchers warn that several compromised web pages are delivering malware disguised as an Adobe Flash update.
The company says details on fewer than 20 percent of those on the list were affected.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?