- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
Wintercore security researcher Ruben Santamarta has identified a vulnerability in a QuickTime plug-in.
Cogent markets biometric systems to government, law enforcement and business customers.
Hari Prasad had been arrested on August 21st for the alleged theft of an electronic voting machine.
The fraud occurred after criminals had stolen the diocese's online banking credentials.
Arcot offers both on-premise and cloud-based identity and access management software.
Iguosade Osahon is accused of stealing more than $500,000 over a three-year period.
Specific details about the vulnerabilities were not provided.
LastLine researchers recently worked with hosting providers to take down almost 20 servers.
The new Cyber Insider Threat (CINDER) Program is aimed at improving insider threat detection.
The latest maintenance and security update addresses a Windows issue.
The emails contain malicious HTML attachments identified as Troj/JSRedir-CH and Mal/FakeAV-EI.
The Obama administration plans to meet with leading domain name registrars to look for ways to crack down on sites selling counterfeit prescription medications.
The software developer bolsters its security portfolio with the acquisition of Arcot, a provider of cloud-based advanced authentication and fraud prevention applications.
A joint operation between the two countries recently busted a major fraud ring.
A recent survey found that 96 percent of IT professionals and hackers polled said the cloud will provide for more hacking opportunities.
A company senior software engineer recently found scareware on an Internet terminal at a UK airport.
According to PandaLabs, 27 percent of all malware infections in the past year came from infected USB hardware.
Traveling for business? Thinking of outsourcing to Russia? AVG compiled data for 144 countries and ranked the safest--and the most dangerous--destinations from which to go online.
The front page of the National Skills Academy web site was recently replaced by hacker JaCKal.
According to IBM's X-Force, there has been a significant increase in malware hidden in .zip files over the past few weeks.
An updated rootkit already floating around the Internet may be a new milestone in how to break into Windows.
More than 10,000 applicants at the University of Connecticut are being notified by school officials that their personal data was exposed earlier this month when a university laptop was stolen.
A recently released update repairs 20 flaws.
The transaction is expected to close by late September.
The BigFix Unified Management Software Platform can monitor up to 500,000 machines.
Symantec is warning of a flood of phishing emails claiming to come from legitimate auto sales brands.
The new guidelines include a mix of technology and process-related advice.
U.S. official confirms a 2008 cyber attack that infected computers used to monitor U.S. combat troops and activities in Iraq and Afghanistan.
In 2008, a flash drive was used to infect several a large number of military computers.
The anti-virus firm recently received funding from private equity firm Summit Partners.
About 1.3 million computers are now infected with Rustock.
The update patches several vulnerabilities that could lead to arbitrary code execution.
Errata Security's Robert Graham says the site still contains several SQL injection bugs.
The fine is the largest ever for a data loss.
Big Blue's X-Force security research group paints a bleak picture, noting growth in both reports of vulnerabilities and flaws that lack a vendor-supplied patch.
Files containing military secrets were stolen earlier this year from infected computers.
UK software engineer Charles Anderson recently received spam claiming that the sender had been hired to kill him.
A security hole in the internals of many Windows applications could lead to an unprecedented rewrite of many popular programs.
The search engine provider is suing 360 for unfair competition.
Versions 22.214.171.124 and 126.96.36.199 were recently released, patching several vulnerabilities.
Hari Prasad was arrested for refusing to reveal the source of a voting machine on which he exposed several security vulnerabilities.
Researchers at the University of Michigan and Princeton University recently hacked a Sequoia AVC Edge voting machine.
Recent firmware updates patch a vulnerability that was demonstrated at Black Hat Las Vegas.
Security vendors fare well as Inc. magazine releases its Inc 500/5000 list, which identifies companies across many industries with significant growth.
The bill is a reintroduction of the same measure the California governor vetoed last year.
A search for Diaz's name has a one-in-ten chance of leading to an infected site.
Responding to criticism over the privacy settings of its new Places product, Facebook is looking to debunk myths about its foray into location-based services.
AnVi Antivirus tries to trick users into uninstalling legitimate security applications.
The airline's central computer system was infected by Trojans, which may have resulted in a failure to raise an alarm.
OzModChips.com has posted three videos that claim to show a jailbroken PlayStation 3 console.
The companies plan to integrate AVG anti-virus into the MokaFive virtual desktop management suite.
Cenzic, Inc. reports that both browser exhibited far more vulnerabilities in Q1-Q2 2010 than they did in Q3-Q4 2009.
The vulnerability exposes more than 40 Windows applications to remote code execution attacks.
The update addresses a flaw that was recently demonstrated at the Black Hat security conference.
Google's Chrome browser gets fixes for memory corruption risks as the company's bug bounty program reaps more results.
The site was recently defaced by Iranian activists.
Malicious software on smartphones could disclose troop locations and movements.
Version 1.1.3 patches a critical security vulnerability.
The critical vulnerability was discovered by ITL researcher Rafal Wojtczuk.
The agency recently awarded a five-year cyber security contract to ManTech International Corporation.
A different response is given to a member's email address with an incorrect password than to an address that's not in Facebook's system.
PandaLabs has found more than 200 spoof web addresses using the singer's name to lure victims.
A fake site at piratebay.com tries to download malware to users' PCs.
The author of The Day of the Jackal and The Odessa File says his computer was hacked in an attempt to access a story he was writing.
Intel acquires security vendor McAfee in an effort to put security wherever Intel silicon is sold.
Version 2.0 is designed to incorporate all the standard AV features expected in any commercial package.
Terms of the deal were not disclosed.
The company's Internet subsidiary and several of its partners are being sued for using Flash cookies to track user data.
The research firm says the revenues will represent an 11.3 percent increase from 2009.
A MobileManager update adds selective wipe, remote lifeline and profile features.
An investigation by the FBI, the local district attorney and local police failed to find criminal intent.
A new do-it-yourself malware kit called Facebook Hacker is extremely easy to use and, according to security experts, particularly adept at snaring passwords for Facebook, as well as other sites.
PacketSentry 4.0, the latest version of PacketMotion's flagship product, delivers PCI segmentation capabilities with an agentless, non-line platform.
HP buys static analysis vendor Fortify, bolstering its development analysis portfolio and raising the stakes against IBM.
The update adds a tool for cleaning already-infected computers.
The hackers (and their motive) remain unidentified.
Version 1.9.1-p430 of the programming language was recently released.
Armorize Technologies says the sites have been serving up malware for months.
An Android game called Tapsnake can track its users' locations in real time.
The ISP will start encouraging subscribers with infected computers to download free security software.
Computerworld's Sharon Gaudin offers five suggestions on how to protect your personal information on Facebook.
Version 7.6.7 resolves a critical vulnerability.
Andrew Auernheimer says the group has undergone more than a month of grand jury proceedings so far.
The department is warning of an increase in tax scam phishing emails.
A 15-year-old vulnerability in NTLM and NTLMv2 is continuing to put organizations at risk.
The anti-spam organization and Latvia's top-level domain registry just aren't getting along.
The new version of the PCI DSS will take effect on January 1, 2011.
The Ministry of Defense's accounting officer says the department's infrastructure is vulnerable to virtual attacks.
Version 10.61 of the browser patches a high severity vulnerability.
The dd_ssh bot is responsible for an increase in targeted SSH attacks.
Properly securing your Voice over IP system is a complex process because VoIP is the integration of data and voice into a single network. These tips will help secure your connection.
Researchers have determined that the graphical password system is susceptible to hacking.
For the second time this year, hackers have compromised one of the humanitarian organization's websites with malware that can capture visitors' personal information.
Leonid "Leo" Aleksandorovich Kuvayev has been imprisoned on multiple child molestation charges.
HostExploit ranks the ISP as the worst in the world.
The product currently includes just 200 signatures, mostly targeting spyware and phishing threats.
Experts say the high numbers are due to lax handling of data in healthcare databases.
The flaws were discovered by MWR InfoSecurity.
Horohorin is currently being held in France pending extradition to the US.
The bug could give spammers access to every Facebook member's user name and photograph.
Officials at six community colleges in Florida are notifying more than 126,000 students that their personal information was exposed online after something went amiss during a software upgrade.
As browsers handle increasingly sophisticated Web apps, Mozilla is taking a hard look at the security and privacy features in its popular Firefox browser.
The two countries will cooperate on areas including e-crime, human trafficking and drug smuggling.
German government ministers are being told to use Simko2 devices instead.
The first SMS-based Trojan targeting Android devices has been detected in the wild.
The German security company has admitted that it incorrectly warned of a Trojan in an upcoming security package from competitor BitDefender.
At the USENIX security conference, a vulnerability expert warns against artificial approaches to shoring up information systems, urging firms to put smart security at the core of any IT deployment.
Researchers have found that privacy settings in popular browsers can expose sensitive data.
M86 Security says the attack is still ongoing.
The Privacy Rights Clearinghouse says college students are particularly vulnerable to identity theft.
Unencrypted wireless communications from tire pressure monitoring systems can be intercepted by third parties.
The deal gives St. Bernard all of Red Condor's assets, along with more than 1,900 customers.
Think Linux is secure? If you're not locking it down properly, you're in for a surprise.
Attachmate Luminet is one of a growing number of enterprise threat management solutions designed specifically to target insider fraud.
Microsoft just patched one zero-day hole in Windows and now it's got a new one to contend with--a buffer overflow flaw in the kernel of all supported versions.
James Robert Black Jr. was sentenced to four months in prison.
All security updates will be downloaded automatically without requiring a confirmation.
The acquisition is expected to close in September.
Sergei Tsurikov faces a variety of fraud and hacking charges.
Since Mozilla already offers the download for free, something's gotta be wrong.
Nicholas Webber and Ryan Thomas are accused of running GhostMarket.net.
Two critical vulnerabilities have been uncovered in the operating system.
The emails ask recipients to confirm their billing information via a compromised web page.
Victims are told to update their Adobe PDF viewing software in order to view an image.
Latest effort would require enterprises and nonprofits that store sensitive information to tighten security requirements and notify consumers in the event of a data breach.
Corporate payroll systems are becoming an increasingly popular target for cyber attacks.
Users can now adjust their privacy settings from any browser-enabled mobile device.
Masato Nakatsuji is alleged to have created the 'ika-tako' virus.
The software is designed to enable users to access encrypted iPhone data backups.
Several vulnerabilities have been found in the Firewall Service Module for the Catalyst 6500 Series Switches and 7600 Series Routers.
The head of the US Cyber Command recently detailed the key threats to US military networks.
The company says users shouldn't open PDFs until a patch is released.
Six people were arrested for running a phishing operation that compromised more than 20,000 bank accounts and credit cards.
The Zeus 2 botnet currently controls approximately 100,000 PCs.
Eight of the top 10 malware variants over the past month were related to the Safsis botnet.
Fully 68 percent of all phishing attacks in the finance sector targeted large nationwide banks during the month of June.
The Department of Homeland Security is dispatching teams to test power plants for cyber security weaknesses.
More than 21,000 patients' names, social security numbers and other personal information were compromised after a laptop was stolen at Thomas Jefferson University Hospital in Philadelphia.
Firefox 4 will include new security features that Mozilla says will help to make it the most secure browser it's ever released.
Software vendors will now have six months to patch vulnerabilities disclosed by the Zero Day Initiative.
The flaw enabled anyone to pass a CAPTCHA test by typing in any 10 words as a response.
A Department of Energy report says the US is leaving its energy infrastructure open to attack.
Version 1.3.0 adds support for Mac OS X 10.6.
The research firm says the iPhone's operating system is now secure enough for enterprise deployments.
The new Centrify Express offering provides a subset of the functionality of the company's Centrify Suite.
Metasploit founder HD Moore details where the open source vulnerability framework is headed and why maintaining the open source base in Linux is tougher than Windows.
A laptop containing sensitive data was lost in an airport on June 10, 2010.
The rootkit can gain access to Android devices either through unpatched vulnerabilities or by masquerading as a legitimate app.
The new botnet has already collected at least 60 GB of data from 55,000 computers.
Malicious files posing as the recent Angelina Jolie film are now available on file sharing networks.
Hi-Line Supply says Community Bank should have noticed that something was wrong.
The organization currently has around 600 members, including CTOs and former spies.
The debate rages on as software and hardware vendors take different stances on whether to pay cash rewards to security researchers who uncover vulnerabilities.
Security software vendor Sophos' midyear Security Threat Report uncovers users' cavalier attitude about cyber warfare.
Although the Snort developer first welcomed the arrival of Suricata, he's since changed his tune.
A wide range of security enhancements are planned for the latest version of the browser.
Paul Mutton was the first to crack the code.
The winners of the 2010 Pwnie Awards were recently announced at the Black Hat conference.
DefCon contest proves your company's greatest security weakness is likely loose-lipped employees who can be scammed into revealing sensitive data more easily than you might think.
The acquisition follows McAfee's recent purchase of Trust Digital.
Webroot's Andrew Brandt says many pirated version of the game come with 'a side dish of malware.'
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?