- Jun 2014
- May 2014
- Apr 2014
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
The applications provide encrypted voice and text solutions for Android smartphones.
The charges are connected to a 2007 theft of almost $450,000.
A pair of unencrypted DVDs storing names and social security numbers of current and former Charlotte, NC city employees has vanished into thin air.
The company may soon start matching Microsoft's monthly Patch Tuesday schedule.
The funds were stolen from Utah's Treasury Credit Union.
Australian police say they've recently seen a dramatic increase in the amount of money being lost through the attacks.
A pair of phishing sites masquerading as credit unions used by military servicemen and servicewomen has been stealing personal banking information for months.
The company has introduced an intiative to offer security and backup solutions for everything from mobile phones to media hubs.
The UK's new deputy prime minister says it's morally the right thing to do to try Gary McKinnon in the UK.
Japanese police have arrested two men suspect of imvolvement in a malware campaign.
Symantec researchers have found a server hosting details on 44 million stolen gaming accounts.
The company has warned of serious vulnerabilities in its Cisco Network Building Mediator products.
Mark Gasson says he's the first person in the world to be infected with a computer virus.
The company says the vulnerabilities could give an attacker complete control of the affected system.
A computer engineer found that a supposedly secure portion of the company's web site isn't.
The vulnerabilities place any company using the software at risk.
Nigel Smart's solution could help improve the security of sensitive data.
The electronics manufacturer's site has been defaced with a 'help wanted' notice stating that the facility is a good place to commit suicide.
Three prominent representatives ask Google for answers about the scope of its Street View operation, which mistakenly collected Internet transmissions over open Wi-Fi networks.
The world's largest security software maker invested an undisclosed amount in Mocana, a San Francisco security firm that specializes in protecting connected devices beyond the PC.
Version 0.96.1 patches a number of key vulnerabilities.
The bank has disclosed two recently security breaches involving company insiders.
Brian Thomas Mettenbrink has been sentenced to a year in jail for a denial of service attack against the Church of Scientology.
More than 122 medical devices have been infected over the past 14 months.
Media Temple was recently hit by a crippling DDoS attack.
The company has announced plans to buy Trust Digital.
Trending topics on Twitter are being used to fool victims into downloading malware.
This week, Meru announced four new Service Assurance applications, including its own WIPS.
The method, called tabnapping, takes advantage of the fact that most people leave multiple browser tabs open at once.
An appeals court has overturned Kevin Trudeau's 30-day prison sentence.
University of Calgary researchers say public Wi-Fi connections could be used to bombard computers with adware.
Aimed at small businesses, Symantec's new suite--due out next month--bridges the gap between classic endpoint security, and backup and recovery.
The kit is designed to probe the visitor's browser for known security vulnerabilities.
Eset recently purchased the anti-spam provider.
General Keith Alexander is now in charge of U.S. Cyber Command.
The addition of a playable Pac-Man game to the site made some users think they'd been hit by malware.
The flaw was first disclosed in May of 2008.
IPS vendor re-engineers its core product to enable more rapid application awareness updates to better protect enterprise security.
According to VeriSign iDefense, bot herders are renting out botnets for £5.99 an hour.
The speed of its spread has security experts worried.
Adrian Lamo was recently hospitalized for Asperger's Disorder.
ZDNet's Dancho Danchev compares Hotmail's new security features with those of Gmail.
The company has added the option of SSL encryption to its search offering.
The project has been updated to version 10.6.1.0.
ReclaimPrivacy.org offers an online tool to help Facebook users check the privacy of their accounts.
More than $800,000 was stolen from a customer's online account in 2009.
For the second weekend in a row, Facebook's 400 million-plus registered users are being targeted by a malware scam disguised as a video of attractive, scantily dressed women.
The company gave out malware-ridden drives at the recent AUScert security conference.
In his first public comments addressing the recent surge of criticism over changes to Facebook's privacy settings, Mark Zuckerberg says the company will release new controls.
The episode is being used as bait to trick victims into downloading rogue anti-virus software.
Under the terms of the settlement, Heartland will make up to $41.4 million available to eligible MasterCard card issuers.
3FN's assets have been seized and will be sold.
U.S. Reps have asked for detailed information about the Internet traffic that Google inadvertently collected when it equipped the cars in its StreetView fleet with software designed to collect only basic, non-sensitive Wi-Fi data.
Database security firm Secerno will be bought by Oracle.
A German forum for trading stolen financial data was recently hacked.
Secerno makes a series of hardware and software products for database protection.
The new UK home secretary has halted Gary McKinnon's extradition for review.
An email offers a beta of the software as an attached zip file, which contains malware.
The documentary 'Hackers Wanted' had never been released.
The updates include Java 6 Update 20 from mid-April, as well as other previously missing Java 6 updates.
The company's head of public policy says the new privacy options will be available within the next few weeks.
A Sophos survey finds that 60 percent of users are considering quitting Facebook due to privacy issues.
The deal will cost Symantec approximately $1.28 billion.
Todd Davis has been a victim of identity theft far more frequently than had previously been reported.
Among the improvements will be the ability to link a specific computer to a user's account.
The flaw was uncovered by Alert Logic senior security analyst M.J. Keith.
As the administration continues its efforts to overhaul the federal government's approach to cybersecurity, agencies are launching an online portal asking for research proposals.
Michael Frost has been accused of using his school's computer network to launch DDoS attacks.
Chelsea soccer fans recently changed the team's recorded message.
Symantec researchers are warning of a site that specifically targets users of a leading prepaid debit card service.
The site was shut down after a hacker demonstrated that he could view 168,000 passengers' personal information.
The Federal Trade Commission is trying to determine whether manufacturers and resellers are warning customers about privacy issues surrounding data stored on the machines' hard drives.
Lookout has received $11 million in a funding round led by Accel Partners.
The Electronic Frontier Foundation says browsers provide Web sites with enough data to get a unique picture of their visitors about 94 percent of the time.
The company will share vulnerabilities with governments worldwide before they're patched, in order to help secure critical infrastructure and assets.
Version 3.4.8 of the file and print server patches two denial of services vulnerabilities.
Banker Trojans targeting smartphones have appeared in recent months.
According to Sophos security researchers, the attack is designed to infect users' PCs with revenue-generating adware.
A Symantec update recently identified a component of World of Warcraft as potentially malign.
Users of PostgreSQL 7 and 8 have been advised to update their installations.
Researchers at Dartmouth College's Tuck School of Business have found that health care organizations are still leaking significant amounts of private medical data over file sharing networks.
Internet users who leave their Wi-Fi networks unprotected can be fined up to 100 euros.
According to PhishLabs researchers, phishing can be a very lucrative way to make a living.
The site is designed to expose the privacy risks inherent in using Facebook.
Ukranian hacker Sergey Valeryevich Storchark allegedly helped Albert Gonzalez sell stolen credit card data.
Version 5.1.47 is expected to patch three security vulnerabilities.
Nearly 10,000 citizens enrolled in New Mexico's Medicaid Salud plan had their social security numbers and other personal data exposed after an unsecured laptop was stolen.
Under pressure from German data-collection authorities, search giant confesses that its Street View cars have been inadvertently collecting unsecured network information.
The company will start offering encrypted search this week.
Jesse William McGraw broke into more than 14 computers at Dallas' North Central Medical Plaza.
A laptop containing information on 9,600 patients was stolen in March.
Whitfield 'Whit' Diffie is ICANN's new vice president for information security and cryptography.
The company recently admitted that its Street View vehicles have been collecting samples of payload data from open Wi-Fi networks.
Verizon Business says SaaS will make it easier and cheaper for enterprise customers to log into corporate networks, share data from mobile devices and more.
Computer scientists recently determind that car computer systems were surprisingly easy to hack.
Telephony denial of service attacks are being used as a diversionary tactic while hackers empty a victim's bank account.
Version 2.7.0 of the instant messenger application addresses a denial of service issue.
Columbia University scientists have developed a chip design that checks for surreptitiously installed backdoors.
The attackers send e-mails to Google Groups members asking them to update their e-mail settings by clicking on a link.
A Sunbelt Software researcher has discovered a tool that creates botnets controlled by Twitter accounts.
The final project for the degree will be an investigation into a new technique for examining digital data.
A stolen laptop contained a significant amount of private data.
Facebook won't name the hacker, but says he's based out of Russia.
Leading social network Facebook is taking steps to improve authentication by blocking suspicious logins and providing users with enhanced notifications.
The Anti-Phishing Working Group says the Avalanche phishing gang was responsible for two thirds of all phishing attacks in the second half of 2009.
Imperva researchers have discovered a botnet that uses Web servers to launch denial of service attacks.
Polish bank BPS is now using biometrics instead of PINs.
The company will stop issuing security updates for Windows XP Service Pack 2 and Windows 2000 as of July 13.
A federal judge has given the FBI access to school computers and thousands of images taken of high school students.
The not-for-profit Scroogle is back up and running.
The emails include attached zip files containing malware.
US District Judge Joan Lenard says the punishment does not match the magnitude of the crime.
The world's biggest social network is calling an all-hands company meeting to discuss its growing image problem over its approach to privacy.
Effort to identify at-risk plugins moves beyond Firefox to include Internet Explorer and other browsers, but does it work?
The security hole could expose personal data on Facebook users who access Yelp.
The Senate has unanimously confirmed Keith Alexander as head of the US Cyber Command.
According to the APSB10-12 security bulletin, 18 of the 21 flaws affect the Shockwave Player.
Anti-Phishing Phyllis is designed to teach players how to spot fraudulent emails.
Ligatt Security International has announced a Twitter campaign called 'How to Become a Hacker in 15 Minutes.'
The attack appears to have been the work of the Eleonore exploit kit.
Researchers at Matousec are warning that a kernel-level attack can be used by hackers to bypass leading security software applications for Windows-based PCs and devices.
Sony had asked for a $33,200 fine, but the judge imposed a much reduced penalty.
Heartland Payment Systems' quarterly financial results indicate that the company has accrued $139.4 million in breach-related expenses.
The unpatched flaw is rated highly critical.
The Trojan is disguised as a Microsoft Windows 7 compatibility tool.
The company has hired Tim Muris in response to increased government scrutiny of its privacy policies.
The question of how a country should respond to cyber attacks has no easy answers.
More than $70,000 was stolen from Jackson Demolition's online bank account.
Jim Breyer's account was recently hit by a scam called FBDigits.
The hacked Web pages have been infected with scripts that install malware on users' systems.
Investigators says the group stole approximately $1 million.
Verizon will soon start including data from the U.S. Secret Service in its Data Breach Investigations Report.
Websense security researchers report that the phpnuke.org site has been compromised.
The worm now arrives via instant message through Yahoo! Messenger or Skype.
The update can block all Internet connections.
A federal court has given preliminary approval to a $4 million settlement.
Asis Internet Service has won a lawsuit against a company that sent almost 25,000 spam emails in an 18-month period.
Security researchers at matousec.com have developed an attack that sidesteps dozens of the most popular anti-virus solutions.
Gadget site uncovers simple way to force other users to follow you, even big movie and TV stars, but Twitter staffers rush out a fix to the weakness in the system.
Visa says it has received reliable intelligence warning that a criminal group will soon attempt to process large amounts of fraudulent payments.
The new company, SSP Blue, will focus on safety, security and privacy.
The 'news center' section of the site was recently found to be distributing malware.
ESET's David Harley says there's a large gap between the perceived threat to Apple products and the reality of how many potential exploits exist.
The company will fix vulnerabilities in Windows and Office on May 11.
The emails offer to check the balance remaining on the recipient's Apple gift cards.
Barnaby Jack will disclose the rootkit at July's Black Hat Las Vegas.
The Information Commissioner's Office will investigate the recent loss of a USB drive containing data on patients and staff at a mental hospital.
A recent audit found 20 IT deficiencies in the system.
Faster network infrastructure pushes more virtualized services into the cloud, reshaping security risks and strategies.
Microsoft rolls out two new products for protecting customers' enterprise data through the use of multiple malware engines on SharePoint collaboration servers.
Instant messaging fans using Yahoo Messenger have been infected by a worm that's disguised as a photo link from a member of a user's contact list.
The flaw enabled Facebook users to view the live chats of other users.
The hacker made the mistake of asking a reformed con man for help with the scheme.
A USB drive containing patient medical records was recently found in a parking lot near the hospital
The cause of the failures is still unknown.
MS10-024 fixed two flaws that were never disclosed.
The bill would require companies to disclose how they collect and share customers' personal information.
Sophos researchers have filed complaints about the account, but nothing has been done.
According to iDefense researchers, hackers are selling large volumes of both fake and stolen accounts.
A new version checks where a newly infected machine is located.
The new version blocks some recently-disclosed attacks.
The new Cyberspace Badge features lightning-bolt wings extending from a central globe.
Two of the suspects recently approached the technical director of Panda Labs, looking for work.
The site was recently found to have an XSS vulnerability, just days after launching.
The flaw could expose users to remote code execution attacks.
The application enables private browsing functionality for a wide range of applications.
Charged with improving Internet and software security, Microsoft's Scott Charney makes recommendations about how to better protect PCs and track down cyber criminals worldwide.
After more than a year of hearings and meetings, Reps. Rick Boucher and Cliff Stearns debut draft privacy legislation that would set parameters for online marketers.
New inline threat-prevention appliance incorporates integrated Malware-VM and Malware-Callback filters to inoculate networks.
A flash drive storing patient names, birth dates, admission and discharge dates, as well as insurance information has gone missing from a Kentucky psychiatric hospital.
A coalition of 11 consumer and privacy groups has stated that the tracking and targeting of consumers online has reached alarming levels.
The web sites redirect visitors to pages that attempt to install malware.
The Spirit jailbreak software has been made available online.
A vulnerability makes it possible for an attacker to gain control of a computer using manipulated TIFF files.
An email offering a Facebook toolbar actually delivers a Trojan.
An F-Secure researcher says Microsoft should create an application like Apple's Preview.
The worm enables an attacker to take over the victim's machine.
Fake Amazon.com newsletters are being used to lure visitors to malicious sites.
Imation's Defender collection of storage devices meets international standards for encryption, including FIPS 140-2 (Levels 1 or 3, depending on device type).
The National Institute of Standards and Technology will be in charge of the National Initiative for Cybersecurity Education.
Courts authorized 2,376 criminal wiretap orders in 2009 -- not one request for a wiretap was turned down.
A researcher has warned that Glype is frequently misconfigured, making logs available online.
David Kernell was convicted of obstruction of justice and misdemeanor computer intrusion.
Kaspersky Lab researcher Yury Mashevsky offers guidance on improving security.
Security researchers have warned that the machines are vulnerable to fraud, and have suggested using a paper trail to verify voting results.
An international study highlights a weakness of business and government cybersecurity: the absence of strong communication between public and private sectors.
The program will help companies assess their compliance with the PCI DSS standard.
Security researchers have developed a method of monitoring all content sent and received by BitTorrent users.
Version 10.53 patches an 'extremely severe' vulnerability.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?