New login verification feature debuts but experts debate on whether it will actually make a real difference or not.
A vulnerability in a vendor's software may have exposed DHS employees' names, Social Security numbers and birthdates.
The hacker announced on Pastebin that he'd found the flaw, but said he had 'no malicious intentions' to exploit it.
4,300 user names, e-mail addresses and encrypted passwords were published online.
An attachment named 'invoice copy.zip' delivers Windows malware identified as Mal/BredoZp-B.
Rhashema Deramus used stolen identities to file fraudulent tax returns claiming more than $1 million in refunds.
Rigoberto Cabrera and Carlos Perez are accused of claiming almost $1.5 million in fraudulent tax refunds.
Edwin Vargas allegedly paid an e-mail hacking service more than $4,000 for the login credentials for 43 e-mail accounts and one mobile phone account.
More than 550 names, e-mail addresses and clear text passwords were published online.
The long-overdue feature should improve Twitter users' account security.
170,000 customers' records, including Social Security numbers and birthdates, were accessible via a simple Google search.
Links in the e-mails redirect victims to Web sites hosting the Blackhole exploit kit.
10,000 patients' names, mailing addresses and e-mail addresses were exposed.
'Cameron holds fundraiser for the terrorists in Syria,' the hackers wrote on the newspaper's Facebook page.
Admin user names and encrypted passwords were leaked, along with parents' and children's full names.
The hackers leaked 2,800 users' personal data, along with admin user names and encrypted passwords.
Larreka Jackson operated a business called It's Tax Time that she used as a front to file fraduluent tax returns.
Sourcefire debuts new approach to tracking malware, but don't call it a SIEM.
The attacks appear to be aimed primarily at intelligence gathering, with a focus on computers in Pakistan.
Hacker Reckz0r leaked nine admin user names and encrypted passwords, and claims to have published four fake articles on the site.
The hackers' explanation for the attacks was given as 'Reason: Patriotism.'
The company says 22 million e-mail addresses may have been exposed, though no passwords were accessed.
Valentin Boanta's Secure Revolving System is being manufactured by Romania's MB Telecom.
8,330 patients were mistakenly sent other patients' bills.
The malware, Backdoor:OSX/KitM.A, takes screenshots at regular intervals and saves them in a folder called MacApp.
Four people ranging in age from 20 to 43 have been placed under house arrest.
The newspaper's tech blog was hacked, along with 17 of its Twitter accounts.
Lewys Stephen Martin disrupted the Web sites of Oxford University, Cambridge University and the Kent Police in January and February of 2012.
Todd Miller was sentenced to a year of house arrest for interfering with an FBI investigation into cyber attacks on Sony's PlayStation Network.
The four received sentences ranging from a 20-month suspended sentence to 32 months in prison.
Information apparently stolen from each of the schools was published online.
Tens of thousands of names, mailing addresses and Social Security numbers were published online.
The first quarter of the year saw the first distribution of Android malware via spam e-mails, and the first targeted Android attacks.
Phoenix police say a man and a woman have been stealing from hotel and motel rooms in those area.
9,988 people's names, contact information, birthdates and credit card numbers may have been exposed.
Hacker Godzilla says the breach is intended to increase awareness of the importance of security on the site.
The total dollar loss from those incidents exceeded $500 million.
The well-designed e-mails link to the legitimate Amazon site, but contain a malicious attachment named 'Your Order Details with Amazon.zip.'
Seventy-five percent of enterprise IT managers say security is their main concern regarding mobile hotspot device usage.
Microsoft issues 10 security bulletins, including critical IE flaws, in May security patch.
Shalamar Major and Tanisha Wright filed 57 fraudulent tax returns requesting $306,720 in refunds.
A temp who had been indicted for identity fraud was given access to names, addresses, e-mail addresses, phone numbers, and Social Security numbers.
Data leaked by the hackers included admin e-mail addresses, full names, and encrypted passwords.
The lawsuit accuses the hospital of breach of contract, breach of privacy, and violating its own bylaws.
The apps downloaded spyware that monitored the victim's SMS, call logs and location.
If you get an e-mail offering you money out of the blue, the researchers advise, it's probably best to ignore it.
More than 10,000 patients' names, birthdates, medical record numbers, diagnoses, doctors' names and dates of service may have been exposed.
Almost 1,200 physical therapy patients' names, account numbers, birthdates, Social Security numbers and home phone numbers may have been exposed.
The centers are being funded with £7.5 million from the EPSRC and the Department of Business, Innovation and Skills.
The newspaper's tech team has detailed the multi-step process the attackers used.
Blessed Marvelous Herve faces up to 20 years in prison and a fine of up to $250,000.
The lesson is simple: don't assume that messages coming from LinkedIn users are any more legitimate than anonymous e-mails.
The hackers may also have accessed up to a million names and drivers license numbers.
Chequila Motley apparently provided her co-conspirators with personal identification information taken from a State of Alabama database.
Adrian-Tiberiu Oprea has admitted his involvement in the theft of more than 100,000 people's payment card data from 2009 to 2011.
Clients' names, Social Security numbers, driver's license information and FSC broker account numbers may have been accessed.
The hackers posted a photo of prime minister Yingluck Shinawatra alongside a statement reading, 'I'm a slutty moron.'
The eight are accused of fraudulently withdrawing $2.4 million from 3,000 ATMs in New York City on February 19 and 20, 2013.
The hackers exposed personal data for more than 3,500 members of the public, along with login credentials for over two dozen department personnel.
The man has apparently confessed that he leveraged a SQL injection vulnerability to breach a classical music site and make changes to customer data.
A fake chat service posing as eBay support attempts to trick victims into revealing their login credentials and other information.
While completing installations, Corey Thompson apparently hijacked customers' Internet access, then filed false tax returns in their names.
Customers' user names, e-mail addresses, encrypted passwords and encrypted credit information may have been exposed.
According to PandaLabs, more than six and a half million new malware samples were created in Q1 2013.
Bernard Beliard sold inmates' personal information to an FBI informant for $9,600.
More than 50,000 user names, e-mail addresses and encrypted passwords were published online.
'If Google can fall victim to an ICS attack, anyone can,' says Cylance's Billy Rios.
Malware was used to access the company's payment card processing systems between March 19-25, April 14-15, and April 20-21, 2013.
Both companies recently announced successful testing by the Defense Information Systems Agency.
Sites claiming to deliver Flash updates actually serve malicious executables that are being hosted in a Dropbox account, according to Zscaler.
Intel’s data security division drops $389 million to expand into the enterprise network protection market.
New zero day flaw in IE8 is identified as being the root cause of attack against the U.S. government.
The malware connects the victim's computer to a peer-to-peer botnet that's currently made up of more than 300,000 infected machines.
While the hackers posted pro-Syria tweets on The Onion's feed, they simply used E! Online's feed to claim that Justin Bieber is gay.
Cristea Mircea, Ion Pieptea and Nicolae Simion are charged with stealing over $2 million from users of eBay, Cars.com, AutoTrader and CycleTrader.
And at least 7.1 million smartphones were irreparably damaged, lost, or stolen last year, according to Consumer Reports.
Spam levels increased by 98 percent from December of 2012 to March of 2013, according to Commtouch.
Michael Meneses allegedly breached the company's network and altered its business calendar by one month.
Hamza Bendelladj faces a maximum sentence of more than 300 years in prison and fines of up to $14 million.
537 former patients' names, genders, ages, birthdates, weights, phone numbers and medical record numbers may have been exposed.
The cost of repairing the damage from those infections was almost $4 billion, according to Consumer Reports.
The malicious code collects system information and uploads it to a remote server, then downloads an additional payload.
According to Core Security, the vulnerabilities could provide attackers with access to the camera's video stream.
Names, e-mail addresses, and physical addresses were exposed, along with some phone numbers, birthdates, and encrypted passwords.
The database was apparently accessed by an unauthorized user from China.
A massive spam campaign addresses recipients by their names, and identifies itself as a 'third reminder' to pay an invoice.
A recent DDoS attack on a gaming Web site was launched from 2,500 WordPress sites that hadn't been compromised.
The National Security Bureau says China currently allocates more than $2.71 million a year to its cyber army.
The new offering provides coverage with limits up to $100,000 to help small businesses recover from a cyber attack.
The researchers say many of the fake Apple login pages ask for the user's billing and credit card information as well as their Apple ID and password.
Information on 818 patients may have been exposed.
The vulnerability can be exploited to determine where and when a PDF was opened.
A coast guard vessel that may have held stored navigation data was sold to a company run by the General Association of Korean Residents in Japan.
Harvey James allegedly obtained stolen identities from people with access to inmate information from the Alabama Department of Corrections.
Leavenworth's Cascade Medical Center has recovered approximately $133,000 of the stolen funds.
Most of the breaches were done in the name of #opPROANIMAL.
A Web-based e-mail account used to inform patients of upcoming appointments was hacked.
Hacker DasTn wrote on the site, 'We chose the path of electronic jihad.'
Following last week's publication of customer data, the hackers took down the company's U.S. Web site earlier today.
The hackers say the attack was launched in response to the newspaper's 'lies and slander about Syria.'
The two groups say the new credential will be available in 2014.
Infonetics predicts that the market will continue to grow rapidly, hitting $2.9 billion by 2017.
Although the arrestee hasn't been officially identified, it appears to be CyberBunker's Sven Olaf Kamphuis.
430 users' full names, e-mail addresses, home addresses, birthdates and credit card details were published online.
50 million users' names, e-mail addresses, birthdates and encrypted passwords were exposed.
The latest version of the company's Android security app adds a spam filter for text messages and phone calls.
And 93 percent of large organizations were targeted, according to a recent report.
The company's customers reported 768 DDoS attacks in 2012, more than three times the 250 attacks reported in 2011.
The vulnerability enables an attacker to bypass the lock screen of any device with the app installed.
Matthew Flannery has been released on bail, and will next appear in court on May 15.
And 26 percent of adults tend to use risky passwords like birthdates or names, according to an Ofcom survey.
Sixty-six percent of command and control servers for APT attacks are hosted in the US, according to the company.
The hackers published extensive contact information for 19 people who had expressed support for Rehtaeh Parsons' alleged rapists.
The company says the error was caused by a 'corrupted file that our encryption tool did not flag.'
The hackers say the attacks were launched in retaliation for the Bangladeshi 3xpr1r3 Cyb3r Army's attacks on Indian Web sites.
The company says the funds will be used to expand its engineering team, accelerate enterprise sales, and increase awareness of its Fusion platform.
Malicious files were found in 4 percent of all e-mails in March, according to Kaspersky.
The hackers posted a fake tweet claiming that FIFA president Sepp Blatter was resigning in response to corruption charges.
The Dow plunged 143 points in response to a tweet posted by the hackers.
The information comes from a series of Secunia Country Reports based on data from the company's Personal Software Inspector.
More than 4,400 registered users' e-mail addresses, user names, encrypted passwords and IP addresses were published online.
More than 90,000 user names, e-mail addresses and clear text passwords were published online.
The company's Austrian Web site was defaced with a page stating, 'Damn Israel.'
A Lieberman Software survey also found that one third of organizations don't have a policy requiring default passwords to be changed.
The hackers say their next target will be the National Police of Ecuador.
Cody Kretsinger, 25, has also been ordered to pay more than $605,000 in restitution.
OpenStack Security Group makes progress securing the open source cloud platform, but lots of work remains.
The same vulnerability was recently exploited in attacks on Reporters Without Borders and NBC.com.
Park Sterling Bank is suing customer Wallace and Pittman PLLC for $336,000 plus accumulated interest.
According to Lookout, the infected apps may have been downloaded as many as 9 million times before they were removed.
The software download site was apparently testing a new installer package, which it has now stopped distributing.
An AlgoSec survey also found that 66 percent of respondents said BYOD policies increase the risk of security breaches.
The VGT now includes 12 law enforcement agencies and 11 private sector partners.
All 13 routers studied by ISE can be taken over from the local network, and 11 of the 13 can be taken over from the WAN.
The malware is designed to capture screenshots and login credentials.
The site, which was registered in the U.S. on April 5, is designed to trick victims into thinking they're downloading files from the real SourceForge.
And the company says 25 percent of all computers don't even have that basic level of protection in place.
According to Seculert CTO Aviv Raff, the malware may just be the first phase of a broader attack.
Gottfrid Svartholm Warg is accused of breaching Logica and the Swedish Tax Agency, and of attempting to transfer 680,000 euros from Nordea Bank.
And according to Prolexic, the average packet-per-second rate in Q1 2013 was 32.4 million.
The hackers have released 1.5GB of data taken from the Ministry of Communications and Information Technologies.
The most commonly targeted victims of such attacks were knowledge workers and sales personnel, according to Symantec.
Oracle nails Pwn2own flaws and expands its people and technology effort to make Java more secure.
The solution, according to AVG Technologies, is simple: just don't download cracks, hacks, trainers or unofficial patches.
The attack was launched in response to NPR correspondent Deborah Amos' reporting on the conflict in Syria.
Lewys Stephen Martin has admitted launching attacks on Oxford University, Cambridge University, and the Kent Police.
Approximately 2.4 million credit and debit card numbers and expiration dates may have been compromised.
More than 1,800 e-mail addresses and passwords were published online as part of #OpLiberation.
The group released a file containing employee data, sales records, PowerPoint presentations and more.
And more than 10 million devices were infected in the first quarter of 2013, according to NQ Mobile.
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?