- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- Apr 2008
- Mar 2008
- Feb 2008
- Jan 2008
- Dec 2007
- Nov 2007
- Oct 2007
- Sep 2007
- Aug 2007
- Jul 2007
- Jun 2007
- May 2007
- Apr 2007
- Mar 2007
- Feb 2007
- Jan 2007
- Dec 2006
- Nov 2006
- Oct 2006
- Sep 2006
- Aug 2006
- Jul 2006
- Jun 2006
- May 2006
- Apr 2006
- Mar 2006
- Feb 2006
- Jan 2006
- Dec 2005
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- Oct 2004
- Sep 2004
- Aug 2004
- Jul 2004
- Jun 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
Using scientific methods, Symantec researchers aim to profile the IT threat landscape.
Credit card numbers, cardholder names, expiration dates, and encrypted debit card PIN numbers may have been accessed.
The attackers are using a modified version of the Zeus Trojan called Gameover.
The company says its LaserJet printers have a 'thermal breaker' designed specifically to prevent overheating.
Early customers include Facebook and YouSendIt.
Leveraging open source ClamAV and the cloud, Sourcefire layers its antivirus tech on top of other vendors solutions.
The Ministry of Defense says the loss of more than 150 laptops was 'almost inevitable.'
Salvatore Stolfo and Ang Cui say the vulnerability could be exploited to cause a printer to catch fire.
Dangerous flaw puts internal Web servers at risk, but there is a fix in the works.
Names, user names, passwords and location information were accessed.
Names, user names, encrypted resident registration numbers and passwords of players of the game Maple Story may have been accessed.
Customers' credit card information may have been compromised.
According to an e-mailed statement, 'there was no malicious or unauthorized traffic from Russia or any foreign entities.'
High profile breaches and mobile devices are driving IT security spending.
Names, addresses, phone numbers, bank accounts and credit card information may have been accessed.
The lawsuit contends that the health care system was negligent in its security, and took too long to notify victims of the breach.
The company is enabling 'forward secrecy' for Gmail, Google Docs, SSL Search and Google +.
Centrify Express 2012 seeks to ease the pain of IT professionals tasked with integrating Unix, Linux and Mac with Active Directory.
A list of customer e-mail addresses was made available online by mistake.
Focused solely on business customers, Sophos is made for small to midsize organizations.
IT salaries overall are expected to increase by 4.5 percent next year, and data security analysts' salaries will rise by 6 percent.
The company has warned targeted subscribers of an 'organized attempt' to access their online accounts.
Stolen information may have included Social Security numbers, birth dates and other data.
If you put the keys to your cloud infrastructure in plain sight, don't be surprised if you get hacked.
At least 10 different cyber attacks were discovered in the last year.
Computers had out of date software, missing security patches and misconfigured firewalls.
The Senate Majority Leader plans to bring cyber security legislation to the floor of the Senate for debate early next year.
The company led the quarter with 82 reported flaws, followed by Oracle and Microsoft.
In a rare move, Google is updating Chrome for a single security fix.
A stolen computer contained patient names, addresses, dates of birth, phone numbers and more.
Hackers may have accessed 176,567 current and former students' and employees' Social Security numbers, names, e-mail addresses and more.
iOS device level security really isn't an option but cloud-based network monitoring might be the way to go.
Global Title Services is suing its bank over more than $200,000 in losses.
Seeking to help organizations control the lifecycle of their sensitive data, RSA introduces enhancements to DLP Suite 9.0 that helps them address smartphones, tablets and social media.
Any one of these discs can get your computer back on track.
Isn't it time to move beyond the infinitely-hackable name and password combo?
It's the employee with the sticky hands that is the easiest and cheapest to thwart.
Patrick Ricciardi faces up to 15 years in prison and a $750,000 fine.
The NextGen Cyber Innovation and Technology Center is expected to open in March 2012.
Still, most spend less than 3 percent of their IT budgets on information security.
The service offers to extract sensitive information for $10 a call.
Management Suite 9 and Security Suite 9 are designed to support a broad range of platforms.
The group is accused of infecting more than four million machines with malware.
Victims are asked for their credit card info and e-mail address in order to 'receive further instructions.'
Vulnerabilities in federal prison control systems could allow hackers to open prison doors and crash CCTV or prison intercom systems.
Security threats are too pervasive, persistent and costly to think about IT security after the fact, according to Ernst & Young.
A lost USB drive could put the 'privacy and financial record of millions of shareholders' at risk, according to the company.
Police have already made at least one arrest in connection with the attack.
Social security numbers, home addresses, phone numbers and e-mail address were published online.
The company says the attack was detected on November 3rd.
Attachmate's terminal emulation family, Reflection 2011 R2, gets upgrades to make users' sessions more secure.
The TrueType font parsing engine is to blame but Microsoft views the risk as low ... for now.
The Dutch certificate authority says it's stopped issuing certificates as a precautionary measure.
An unencrypted memory stick containing personal information on more than 18,000 people was lost.
Security experts from the US and 27 European Union member states participated.
Files belonging to Major-General John Cantwell were likely stolen during transit through Kuwait.
The researchers found that 13 out of 15 CAPTCHA methods from leading Web sites were vulnerable to automated attacks.
The antivirus community has failed to figure out this able and persistent piece of malware. It's as simple as that.
Security research firm provides another option for researchers looking to co-ordinate vulnerability disclosure.
GCHQ director Iain Lobban says major IT systems throughout the UK are facing increasing numbers of attacks.
The Secunia Vulnerability Coordination Reward Program promises merchandise and access to a security conference.
Local news reports are unclear, but some systems were left out of action for three days.
Palestinian Communications Minister Mashur Abu Daqqa said the attacks appeared to be state-sponsored.
The legitimate-looking e-mails ask victims to provide their ID and password.
Antivirus software is a necessity these days but some solutions are a bigger drain on system resources than others. See how AVG, Microsoft, Avast and Comodo compare.
Documents containing clients' names, addresses, birth dates and health card numbers were recently found in a dumpster.
Dillon Beresford says the vulnerability could be used to take control of systems running the software.
A vulnerability in the TimThumb image resizing utility for WordPress sites has had an enormous impact.
Simon Van Neste used forged ID cards to access secure areas of the Whitman College campus.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?