- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
More than 200 web sites were recently vandalized.
The viewer will be updated automatically along with the browser itself.
Core Security Technologies researchers have found a flaw in Cisco's Aironet 1200 Series Access Point.
The vulnerability allows data to be accessed without authorization.
Programmer Jesper Andersen recently discovered a privacy issue inherent in Foursquare's practice of publishing user check-ins.
The botnet has infected 318,058 machines since April.
Hackers recently broke into the company's payment processing system.
Making good on its promise to Canadian privacy authorities, social networking giant Facebook said it has simplified the permission controls for users sharing data with third-parties.
The updates released this week will replace the company's quarterly security update that was scheduled for July 13.
Educating consumers presents issues, but with business, government, and individuals all working together, panelists were optimistic about our cyber security future.
At the Red Hat Summit in Boston last week, Josh Bressers, a senior security engineer at Red Hat, explained why open source really is the best model for building secure software.
More than 20 percent of all spam came from the US during May 2010.
The devices already vastly outnumber PC workstations.
New cloud-based security service helps protect companies from malware without the need for any on-premise software or hardware.
Versions 1.2.44 and 1.4.3 were recently released for the libpng reference library.
The scam had resulted in the theft of $9.5 million over four years.
False rumors of the rapper's death are being used to spread malware.
The software responded to the installation of Firefox 3.6.6 with a malware alert.
Brazilian police, working with the FBI, have been unable to access a Brazilian banker's encrypted files.
The money was stolen via 26 consecutive wire transfers.
First new releases debut after HP's 3Com acquisition, but full integration of the two companies' products is still a work in progress.
The National Strategy for Trusted Initiatives in Cyberspace (NSTIC) describes an "identity ecosystem" that promotes security, privacy and a consolidation of the various login credentials users maintain to access online services.
Version 5.0.375.86 patches five vulnerabilities, three of them critical.
The apps were proof-of-concept programs developed by a security researcher.
Thousands of students and dozens of faculty members had their names, social security numbers and other PII exposed for months before officials locked down an unsecured database.
New study examines 119 million domain names to discover some surprising results into how many are using SSL properly.
A recent study by Enigma Software determined which US cities have the highest malware infection rates.
Francois Cousteix received a five-month suspended sentence.
The company says its competitor's practice of publicly exposing web pages used to process security certificates puts its customers at risk.
The aim is create an Identity Ecosystem 'where individuals, organizations, services, and devices can trust each other.'
Edward J. Markey and Joe Barton have asked Apple to explain the changes by July 12.
Sunbelt Software researcher Christopher Boyd says fans of the TV show are being targeted in several different ways.
A survey of IT professionals finds the growing use of iPhones and other personal mobile devices on corporate networks poses a security problem.
The company's security program will be examined by an outside auditor every other year for 10 years.
The vulnerability could be used to spread malware via Twitter.
The forum had almost 8,000 members who traded malware, tutorials and stolen banking data.
Barry Ardolf is accused of sending threatening emails to Joseph Biden via his neighbor's Wi-Fi network.
The Social Security numbers and medical records of more than 230,000 members are exposed after the health insurer failed to secure its corporate website.
The patches will be released two weeks ahead of the company's normal schedule.
Peter Hustinx says transfers of banking data should be filtered so that only relevant data is sent.
The iPhone's new operating system has already been hacked.
Luis Mijangos has been accused of hacking into computers and demanding sexually explicit videos from female victims.
Personal data on almost 20,000 students and faculty members may have been exposed online.
Pike Research anticipates that $21 billion will be invested in smart grid system security over the next five years.
Large sections of the e-book appear to have been stolen from other writers.
The Core Insight Enterprise platform, now in beta, provides an automated test bed that builds on the Core Impact penetration testing application to test IT security.
PandaLabs researchers have demonstrated a malware infection on a jailbroken iPad.
A Guardium survey finds that retailers are the least trusted entity in the world.
SMobile Systems warns that one in five Android applications give a third party access to private data.
The partnership is aimed at helping companies better manage sensitive data.
The company's Secure Social Media Management offering provides professional review and consulting regarding social media policies.
Microblogging service Twitter agrees to settlement with Federal Trade Commission regarding high-profile security breaches that dogged the site in early 2009.
Out-of-Process plug-in support comes to open source Web browser, providing new crash protection for Linux and Windows users.
A major milestone as the first major top-level domain is now secured with DNSSEC. But the process of securing all .org domains isn't done -- yet.
More than 1,000 Twitter accounts were hacked during a 12-hour period.
The latest version of Apple's iPhone operating system is only available for the second and third generation iPod touch, and the iPhone 3G and 3GS.
A new report from the Standing Committee on Communications suggests that users should be required to install anti-virus and firewall software before their Internet connections are activated.
A Softchoice survey found that 77 percent of companies are still using the soon-to-be-retired Windows XP SP2.
The application applies firewall policies to users regardless of their location.
Trustwave will continue to sell and support Breach Security's firewall solution.
The new policy allows the company, its partners and its licensees to 'collect, use, and share precise location data.'
The flaw can allow an attacker to inject arbitrary code into a newly opened window or tab.
As Apple rolls out the new mobile platform iOS 4 this week, mobile management firms are unveiling new services to support the OS that focus on mobile security.
Leading security software takes an average of 45.8 hours to block malicious Web sites.
The company's new iPhone Management offering provides complete compliance management functionality for iPhone, iPad and iPod touch devices.
A report contends that the growing trade in illegal pharmaceuticals is being enabled by Internet registrars.
The vulnerability only affects VPN implementations that are using IPv6.
Details of the flaws have not yet been released.
The government, educational institutions, and military contractors are looking for the next generation of cyber security pros.
The security firm's mobile research group manager says the growing popularity of smartphones is driving a surge in mobile malware.
In response to an open letter from privacy advocacy groups, Facebook has published an open letter of its own.
The last copies will be shipped in March 2011.
Mark Weatherford is leaving to become vice president and CSO of the North American Electric Reliability Corporation.
Confidential documents were left unsecured in a squad car parked overnight on a residential street.
Alistair Peckover was sentenced after pleading guilty to two counts of fraud.
Several Turkish government web sites have been taken offline.
The extension encrypts most or all communications on several web sites.
The emails contact a malicious file named report.exe.
A recent update to OS X secretly added protection against a Trojan.
The domain name systems managing body pushes DNSSEC as the way forward to make the Internet a safer place for all.
VeriSign researchers says customers actively look for sites that show strong security credentials.
The company's director of information security says the answer is to install an encrypted hard drive.
All versions from 3.0.x to 3.3.12 are affected.
Version 2.0 adds new scanning tools, detection engines and support.
Therese Coffey says she's had particular trouble regaining control of her Twitter account.
The volume of Father's Day spam is growing rapidly as June 20th approaches.
A security researcher says hackers aren't trying to shut down the nation's power grid -- they're focused elsewhere.
In yet another move to take a bite out of cybercrime, Microsoft's Digital Crime Unit sues over one of the largest spam attacks ever.
A critical milestone in the history of Internet security happened this week at a "key signing" ceremony. Are we all now safer as a result?
New app helps to cut down on phishing, ID theft, and account compromises by letting investigators quickly report stolen credentials and credit card numbers.
San Antonio-based GlobalSCAPE has partnered with Rackspace Hosting to provide its Enhanced File Transfer Server as a subscription.
A coalition of privacy groups has outlined several Facebook features that continue to jeopardize user privacy.
Hackers could potentially steal customer data and even cause widespread outages.
The SSA's Inspector General says the use of unencrypted CDs to transport data is widespread.
So-called "limited" attacks have appeared since a security researcher revealed a hack that could put Windows XP users at risk of attack.
White House IT officials have been exuberantly talking about moving government IT to the cloud, and the process is already in motion, but federal privacy officers are speaking up.
The company hopes to reach markets that require MFT solutions for sensitive information transfer.
A judgment against Spamhaus was cut from $11.7 million to $27,002.
Soon to be part of Symantec, VeriSign's SSL security certification business is growing as the need for SSL continues.
A next-generation exploitation kit is being used to target banks in Russia and the Ukraine.
Malware distribution is a profitable sideline for the porn industry.
For a phishing gang, one server is as good as another.
The agency has established a fraud alert web site describing scams that have already been reported.
The product ensures that web pages are secure enough that personal information can be entered safely.
Customers were mistakenly logged into other users' accounts.
Microsoft says there has been 'limited exploitation' of the unpatched flaw.
The government has banned the use of iPhones for official business.
Committee leadership races to bring major cybersecurity legislation that would expand White House and DHS authority over private sector to a markup.
The update is rated highly critical.
The company's Norton Online Family service is now available in 25 languages.
A new clickjacking attack is currently targeting users of the social networking site.
A backdoor, which had been there since 2009, was recently discovered in the Linux version of the UnrealIRCd server.
The company says it's planning to seek prosecution of the hackers who recently exposed 114,000 iPad users' email addresses.
The company is telling customers that Ubuntu is a safer operating system than Windows.
Joseph Lieberman, Susan Collins and Tom Carper recently introduced the Protecting Cyberspace as a National Asset Act of 2010.
The company is making its smartphone security solution available for free throughout the 2010 World Cup.
The organization has published two sets of guidelines for testing security software.
The company has introduced a new app designed to help users stay aware of new threats.
Barry Ardolf has been charged with using his neighbor's Wi-Fi network to send threatening emails.
Sepaton is positioning Secure Erasure, an optional software feature ($5,000 per node), as a cost-effective way to comply with data destruction policies.
The hackers insist they did nothing illegal.
The budget for the Police Central eCrime Unit has been cut by 30 percent.
The fines, for failing to protect patient data, total $675,000.
Government officials may temporarily block wireless signals during the upcoming summits.
Alarmed at the recent exposure of more than 100,000 iPad users' data, FCC issues a warning on cybersecurity. Meanwhile, AT&T seeks to reassure customers that all's well.
Five California hospitals were fined a total of $675,000 last week by the state's Department of Public Health for failing to prevent unauthorized access to patients' data.
Trend Micro has acquired online backup and data synchronization company humyo.
The proof-of-concept tool tricked users into clicking on malicious links sent via chat 76 percent of the time.
Modules in release-candidate mode will not be supported.
The information security for the FIFA World Cup has been a work in progress for years.
A federal audit determined that the Department of Homeland Security's network doesn't have the appropriate level of security.
Users experienced service disruptions earlier this week.
Industry experts say the current £500,000 fine won't motivate companies to protect sensitive data.
The company has acquired document encryption provider Liquid Machines.
A company security engineer published the attack code just five days after reporting it to Microsoft.
The Australian government will stop supporting AusCERT, replacing it with CERT Australia.
The service will be rolled out to all users within the next few months.
The Tequila botnet appears to have been dismantled by its owners.
Windows XP may be nine years old but, as the most popular version of Windows, it leaves a lot of users in a precarious position when a serious security hole pops up.
A group of hackers recently accessed the e-mail addresses of approximately 114,000 iPad users.
All telecom equipment imported from China will be inspected for software that could be used to monitor transmissions.
Attempting to play the videos on the sites installs a downloader Trojan.
Malaysian police have busted a group accused of stealing almost $2 million.
The amount is only awarded for vulnerabilities which are particularly critical.
E-mails that appear to come from Twitter lead victims to malware and phishing sites.
World's leading social network partners with PTA to promote online safety, pledges $1 million to the cause.
The security hole that allowed at least one organization to access e-mail accounts belonging to iPad owners including Michael Bloomberg and Rahm Emanuel has been closed, AT&T says.
Leading security software vendor and the world's largest computing company announced a multi-year deal that will keep Norton Internet Security on all HP PCs for free for 60 days.
Three new technologies have been added to the company's Endpoint Security and Data Protection offering.
The service shares users' GPS data online by default.
Brian Matty Hagen recorded customer information, then tried to sell it to an undercover FBI agent.
Over 1,700 Stylus Tough 6010 digital cameras were shipped with malware on the included memory card.
The new service is designed to protect domain names from fraud and abuse.
A beta of Mobile Active Defense Enterprise Unified Threat Management will launch later this month.
ViaSat acquired Stonewood for $20 million.
A recent study examined the wide range of techniques porn site operators use to make money.
Sophos has identified the strain of malware on the newspaper's site as Behav-290.
Here's your chance to ask experts from Internet.com and Microsoft questions about the new features and versions of Microsoft Visual Studio 2010 and .NET 4.0
Nine highly critical flaws get patched in Chrome as Google's Chrome Frame hits beta.
The web site for Scotland's Strathclyde Police has been temporarily disabled.
Soon after David Green logged onto his company's online bank account using his wife's PC, almost $100,000 was stolen from the account.
OfficeScan 10.5 is designed to provide virus protection for virual desktops.
Botnet operators no longer have to rely on stealth and creativity to hide from authorities.
The country's police are currently working to determine whether Google's wireless data collection activities violated privacy laws.
The amount of malware and spyware found on smartphones has more than doubled in the past six months.
Malicious posts are now using a wide variety of exploits and malware.
More than $644,000 was stolen from the department's online bank account.
Those looking for free copies of a new game should proceed cautiously.
HP will be providing infrastructure and applications integration for a Cyber Control System designed to provide strategic information and identify cyber threats for the USAF.
A staff member recently sent an unencrypted USB drive containing patient data through the mail.
A federal appeals court has denied Joel Ruiz's claim regarding the exposure of his personal data.
The flaw allowed search engines to index email addresses that weren't tied to member accounts.
Lavasoft researchers have listed five key security risks tied to the upcoming FIFA World Cup.
The software suite has been updated to version 3.2.1.
The attack exposed personal data on almost 200,000 individuals.
The company says the flaw is currently being exploited, and no official patch is yet available.
Colorado Casualty is refusing to reimburse the University of Utah for costs related to a 2008 breach.
Adobe warns of serious security flaws in flash and PDF that could be leaving millions of users open to attack.
New security white paper details Google's security practices for its cloud-based apps.
CyberSpy can no longer promote the fact that its software can be installed without the PC owner's consent.
The UK's West Berkshire Council recently lost an unencrypted USB drive containing physical and mental health data.
The company has added new security features, along with a Pro version.
Three of the 10 bulletins planned will be rated 'critical.'
The company's CEO recently struggled to defend Facebook's privacy policies at the D8 Conference.
A microSD card carrying a Trojan was shipped with some S8500 Wave smartphones.
Versions 0.9.8o and 1.0.0a include important bug and security fixes.
The scam offers free iPads in return for filling in a questionnaire.
A pair of thieves who moved an enormous amount of counterfeit software applications through the online classified site have finally been busted.
Speaking publicly for the first time since his installation in the top spot of the Defense Department's Cyber Command, Gen. Keith Alexander emphasizes the severity of the danger.
The volume of spam related to the upcoming event in South Africa recently increased by 27 percent.
The attacks are targeting users who haven't installed a recent security update.
The popular game is being used to trick victims into downloading fake anti-virus software.
Several users' accounts were recently hacked.
Nicholas Percoco and Christian Papathanasiou will demonstrate the rootkit at the Defcon security conference.
Raul Romero claims to have discovered three flaws in the Secunia Personal Software Inspector.
A release candidate has been made available instead.
According to a report in the Financial Times, Google began moving employees to other operating systems after its systems were hacked.
The attacks force victims to send text messages to premium numbers.
The protest only attracted about 34,000 of the site's hundreds of millions of users.
The malware is now being distributed via popular download sites.
An increasing number of malware authors are now actively posting updates describing their work.
The clickjacking attack forced victims to recommend a series of links.
A demo of the game '3D Anti-Terrorist Action' has been doctored to include a Trojan.
Details are being withheld until patches are available.
The company recently announced the acquisition of IM Global.
Malware scamsters have weaseled their way into an unknown number of online gaming accounts on the popular Chinese entertainment site.
The owner of Brew HaHa! describes the wide range of vulnerabilities that led to a series of recent security breaches.
The disguised version of the Trojan was discovered by TrendLabs researchers.
The Red Flags Rule had been scheduled to take effect on June 1.
The company's official account was recently hacked.
Researcher Bernd Marienfeldt has discovered that Ubuntu 10.04 offers full access to an encrypted iPhone.
Version 2.0.3 of the browser closes a number of critical security holes.
Richard Allan is among the UK's new Liberal Democrat peers.
A new federal indictment exposes a common Internet scam--tricking users into thinking they've been infected with malware so they'll buy bogus security products from cybercriminals.
A cloud-based authentication specialist wants to make financial transactions more secure through the use of one-time password technology on mobile devices.
An amendment included in the final version of the NDA act would install a permanent cybersecurity office in the White House and reshape government IT security compliance.
Several of the company's products have been updated.
JobSearch.co.uk and jobs.mirror.co.uk were recently attacked.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?