- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- Apr 2008
- Mar 2008
- Feb 2008
- Jan 2008
- Dec 2007
- Nov 2007
- Oct 2007
- Sep 2007
- Aug 2007
- Jul 2007
- Jun 2007
- May 2007
- Apr 2007
- Mar 2007
- Feb 2007
- Jan 2007
- Dec 2006
- Nov 2006
- Oct 2006
- Sep 2006
- Aug 2006
- Jul 2006
- Jun 2006
- May 2006
- Apr 2006
- Mar 2006
- Feb 2006
- Jan 2006
- Dec 2005
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- Oct 2004
- Sep 2004
- Aug 2004
- Jul 2004
- Jun 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
Smart patching and whitelisting combined with antivirus are a good way to ensure you are going beyond the basics.
Journalists' names, pictures, addresses and passport numbers may have been exposed.
The attacks weren't described in detail, but were deemed 'successful.'
Even the security giants are not immune from this sophisticated and growing form of attack, writes Jovi Bepinosa Umawing of GFI Software.
The new account hijacking attack was demonstrated last week at the ACM Conference on Computer and Communications Security.
Enterprises need to dig deeper than just automated scanning to find the really interesting and dangerous cyber security flaws.
Symantec researchers have already found 87 URL shortening sites set up by spammers.
Lawmakers' user names and passwords were stolen in a cyber attack launched from a server in China.
Bank fraud is and will continue to be an expensive problem.
New Akamai report points the finger at Asia-Pacific for most attack traffic.
The number of data breaches in the private sector rose by 58 percent in the 2011/12 period.
Juraj Somorovsky and Tibor Jager say there's no simple fix for the problem, and the standard needs to be changed.
Skype users' IP addresses can be tracked and then link to those users' online activities, including file sharing.
New browser, Silk, and Amazon's cloud at the heart of IT security concerns.
The Cisco ASA 1000V Cloud Firewall provides firewall capabilities, real-time threat defense, always-on remote access and comprehensive network security.
The 'most hostile' one, say researchers at Accuvant Labs.
Is Duqu related to Stuxnet? Who is behind cyber espionage and why Adobe Reader is to blame for the whole thing.
The breach prompted the company to close the Web version of Gameloft Live.
Weatherford's role entails working with private sector partners to strengthen the country's overall cyber security position.
Unencrypted backup tapes containing 1.6 million patients' and employees' personal data have been lost.
Bringing the hacker mindset into corporate IT isn't always a bad thing.
Approximately 900 current and former staff members' personal information was made available online for more than two months.
The Obama administration considered hacking into Libyan computer networks to disrupt military communications.
More than 400,000 Social Security numbers have been published by mistake since 1980.
Symantec recently withdrew an update that identified the social networking site as a 'fraudulent Web page.'
Publicly listed companies must now disclose all cyber attacks, if those attacks could cause financial damage to the company.
The lawsuit seeks $4.9 billion, or $1,000 for each of the 4.9 million people affected.
Your logs aren't just for auditing and compliance, they can also be used in an SIEM solution that will remediate for security risk and threats.
First State Super called the police after thanking Patrick Webster for advising them of the flaw.
According to company executive chairman Art Coviello, two individual groups from a single nation state were involved.
Want to get more out of your iPhone, iPad, or iPod Touch and be secure? Read on.
The upgrade, which will be free to existing customers, will be released on October 25.
Although 93,000 accounts were accessed, the company says no credit card information was at risk.
Dell SecureWorks blocked an average of 91,500 attacks per retailer during the first nine months of 2011.
Yet another suite of tools for IT security folks to administer and manage can actually have the opposite effect.
Microsoft patches October's bugs, plus it releases its latest Security Intelligence Report.
The sites share visitors' personal information with advertisers or other third parties, often without disclosing in privacy policies that they do so.
A link asking users to update their accounts leads to a compromised Web site in the Seychelles.
Intrusion prevention scaled to 40 gigabit Ethernet as demands continue to rise.
The settlement allows identity theft victims to collect between $50 and $2,500.
The attack takes about seven hours to recover the key protecting the Mifare DESFire MF3ICD40.
The vulnerability could be used to steal credit card customers' login data.
The security flaw could be used by remote attackers to access internal servers.
The first major overhaul in four years of Kaspersky's business antivirus software, Kaspersky Business Space Security, is out.
The class action lawsuit seeks $20 million, or $1,000 per patient whose personal information was exposed.
An unencrypted memory stick containing 800 patient records was lost.
The new version adds enhancements to ease of use and deployment.
The new solution is designed specifically to detect bot-infected machines.
The company will pay $100 to $500 for working exploits.
Hugo Vázquez Caramés found the flaws during an ethical hack of a customer's network.
When California-based Hurricane Electric Went down, Vodafone NZ users were unable to access some US Web sites.
In one the unlikeliest turn of events brought about by technology, it looks like Middle Ages' siege warfare may be making a comeback, writes Gunter Ollmann of Damballa.
McAfee will purchase NitroSecurity, and IBM will buy Q1 Labs.
The vulnerabilities could potentially allow an attacker to take control of the affected system, according to the company.
According to the GAO, reports of security incidents among 24 key agencies increased by more than 650 percent over the last five years.
Brigadier General Ali Shadmani has said that mounting any cyber attack against Iran would be risky for the US, UK and Israel.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?