- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
The country has overtaken India and Russia to become the world's biggest virus producer.
The malware was specifically designed to compromise the restaurant's POS system.
A survey by Deloitte and NASCIO has found that nearly half of state CISOs report reduced budgets last year, even as the threat landscape for states worsens.
The group is accused of being collectively responsible for the theft of more than £6 million over the last three months.
The FBI and the U.S. Attorney's office in Southern New York filed charges against 37 people suspected of orchestrating a sophisticated international malware scam that stole more than $3 million from victims' bank accounts.
According to Websense, the top 1,000 web sites are typically two clicks away from malicious content.
The spam emails, posing as package delivery failure notifications from the US Postal Service, distribute the Oficla Trojan.
The flaw was discovered by researcher Billy Rios.
The Department of Homeland Security has launched Cyber Storm III, a three-day cyber security exercise.
US District Judge Thomas Phillips rejected the arguments of David Kernell's lawyers.
The malware is designed to avoid detection by running on a computer's graphics processor.
The emails were designed to trick users into downloading the Zeus Trojan.
The company recently announced the launch of AVG Anti-Virus Free 2011.
Department of Homeland Security convening officials from half a dozen other agencies and departments as well as a gaggle of foreign countries to test readiness and coordination mechanisms in response to a major cyberattack.
After more than 400,000 users were affected, Google fixed the vulnerability.
The security general at Abu Dhabi's executive council says the UAE is confident an agreement will be reached.
A Zeus variant is specifically targeting users who perform online banking transactions on their mobile phones.
According to Kaspersky, hackers have designed malware specifically to take control of gamers' accounts.
The company is in the process of introducing a range of new security features.
A McAfee survey has found that executives are worried about the security issues that come with Web 2.0 technologies.
Katura Mozelle, Kinte Green and Fatima Green used information from a government web site to steal victims' identities.
Security researchers at Cisco say the social network for professionals has been hit with a massive malware campaign designed to steal users' online banking credentials.
The attack follows DDoS attacks against the MPAA's and RIAA's web sites.
Kaspersky Lab researchers have found malware on the free web hosting service.
Government officials say the Stuxnet worm has infected at least 30,000 PCs in Iran.
Christopher Lewis and Michael Nebel were convicted of briefly defacing Comcast's web site.
Iran's official news agency said the worm had managed to infect computers operating at its first nuclear power plant, but had thus far only caused minor damage.
Edwin Andres Pena was also ordered to pay more than $1 million in restitution.
The Office of the Chief Information Officer did not follow best practices, according to a recent report.
Liviu Mihail Concioiu is accused of stealing more than $3 million.
Bruce Raisley faces a maximum sentence of 10 years in jail and a fine of up to $250,000.
The company will soon make its Security Essentials software available to small businesses for free.
The company's AnyConnect Secure Mobility software for iOS 4.1 is now available in Apple's Apple Store.
Two years after the data warehousing company admitted it once again failed to secure consumer data, its victims are starting to receive their compensation -- all $18.17 of it.
The company has filed a civil lawsuit against fraudulent pharmacies that advertise on its search site.
Pentagon cyber boss Gen. Keith Alexander outlines the daunting challenges ahead for military and civilian cybersecurity. Meanwhile, congressional efforts to overhaul the federal policy framework appear to have stalled.
Enterprises concerned about iPhone security have a new option courtesy of Cisco.
The ruling limits consumers' ability to claim compensation for time and effort spent updating their accounts after a breach.
Visitors to the photo section of the teaparty.org site were diverted to other sites.
The online data broker will refund fees paid by almost 5,000 customers to have their records protected.
VaporStream's software is designed to combine the ease of use of e-mail with the privacy and security of an in-person chat.
Enter a phone number, and the site returns that user's email address.
More than a third of the students said they simply did it for fun.
Still, Privacy Commissioner Jennifer Stoddart says she will continue to monitor the web site.
The new tool is designed to help organizations identify and prevent malicious activity.
Security researcher Ralph Langer says the worm may have been created specifically to attack Iran's Bushehr nuclear reactor.
The company has developed a new card that provides additional protection against theft by concealing part of the card number.
Dmitry M. Naskovets was recently transferred from the Czech Republic to federal prosecutors in Manhattan.
The update fixes a flaw that gave hackers access to shared folders and files.
Ciphent's CEO will become part of Accuvant's management team.
The company released the fix at least a week earlier than original planned.
According to Panda Security, the attack was launched in retaliation for similar DDoS attacks aimed at The Pirate Bay.
Hole in server encryption could leave many systems open to attack, researchers and Microsoft officials say.
Pop-up warnings appear to be designed to scare users into buying the paid version of the software.
A scientist and his wife are accused of providing classified nuclear weapons data to an FBI agent posing as a Venezuelan government official.
The home page of the Sweden Democrats was replaced with an image of a birthday cake.
The flaw was discovered by security researcher d3v1l.
Jonathan Evans, head of MI5, says it isn't difficult to plug key vulnerabilities if you're aware of them.
Paul C. Pepala is accused of accessing the names, birth dates and Social Security numbers of patients for personal gain.
The gang sold Social Security cards stolen from Asian immigrants working in American territories.
The fraud was only recently discovered by Interpol's Security Incident Response Team.
Using a soliton to transmit a call could make the signal harder to intercept.
The infected sites redirect visitors to a scareware distribution web site.
Free two-factor authentication feature is designed to add an extra layer of protection to Google's cloud applications.
Officials at Rice University are warning 7,000-plus staffers and students that their personal information was exposed after a portable storage device was stolen.
The open source alternative to Facebook has been found to contain several vulnerabilities.
The game is being used to harvest Facebook user names and passwords.
A gang in New Hampshire monitored Facebook pages to determine when victims would be out of their homes.
The companies are collaborating on a new approach to storage security solutions.
The basketball star has been accused of hacking into the voicemail of his former employee and mistress.
One of the flaws was discovered by security researcher Ruben Santamarta in late August.
David Barksdale was fired in July after accessing at least four user accounts.
The site, InterSeC, currently has more than 8,500 members.
The company has scheduled a regular patch day to coincide with Microsoft's Patch Tuesday each month.
M86 Security says Twitter's planned redesign may lead to criminal abuse.
A confirmation email was recently CCed to 370 recipients, providing a complete e-mail list to all entrants.
The scam appears to be the first of its kind in Australia.
The research firm says large companies are likely to continue acquiring smaller security providers over the next several months.
Version 3.5.5 patches a stack overflow vulnerability.
The ads expose users to Windows Trojans via drive-by download attacks.
Members of the Censorship Research Center have asked that all remaining copies of the Haystack tool be destroyed.
There's no word yet on when updates will be reactivated.
PricewaterhouseCoopers says corporate spending on data security will soon increase sharply.
A critical vulnerability in Adobe Flash Player is being actively exploited in the wild, according to the company.
The company's Safe Browsing service recently blacklisted the site.
The unidentified hacker stated that the attack was intended as a propaganda tool.
The IMDDOS botnet was created specifically to offer DDoS attacks on demand as a commercial service.
According to GData, only 0.6 percent of new malware targets other operating systems.
The university is now using CryptoCard's CRYPTO-MAS authentication service.
The virus installs on the Windows directory as a file called CSRSS.EXE.
F-Secure reports that web users' worries about online privacy and security differ worldwide.
Personal data on more than 35,000 English soccer fans may have been accessed and sold on the black market.
Symantec reports that malware spam more than tripled during the month.
Viktor Pleshchuk received a six-year suspended sentence in exchange for providing information to authorities.
More than 7,000 students attending City College of New York this week are receiving the bad news that their most sensitive personal information is up for grabs.
Stanford University's Lucile Packard Children's Hospital is appealing a $250,000 fine for delayed reporting of a data breach.
IT administrators are still cleaning up their email servers after last week's potent 'Here You Have' virus inundated corporate servers with billions of spam messages.
Computing giant HP expands its security lineup with the acquisition of ArcSight's risk management and compliance offerings.
Version 10.62 of the browser was recently released.
The company has released software updates to address vulnerabilities in its Wireless LAN Controller and Wireless Services Module products.
The HackIsWack web site is still vulnerable to rickrolling.
A recent Symantec study found that 65 percent of web users worldwide have been hit by some form of cybercrime.
The malware sends SMS messages to premium rate numbers, at a cost of as much as $6 each.
Security firm su53 Solutions says the service is the first of its kind for SAP systems.
The 537-page guide focuses on protecting the power grid from cyber attacks.
Customers have been informed that their credit cards' number, expiration date, security code and encoded magstripe data are at risk.
The emails ask users to update their Google account information.
According to a recent survey, nearly a third of remote workers use their own computers, and many have no form of network login.
Norton Power Eraser is designed to detect and eliminate a scareware infection.
Safari 5.0.2 and Safari 4.1.2 patch three flaws that expose users to drive-by download attacks.
Rumors and speculation over the possible takeover of Symantec, a valuable IT security acquisition, appear to have started a small buying spree for Symantec's stock.
Kaspersky Lab researchers say more than 100,000 users have already clicked on one malicious link.
The two men are the first to be charged under the country's new cybercrime law.
A USB drive containing unencrypted information was recently found on a UK street.
The attacks have been timed to coincide with a real Bank of America Military Bank service update.
The infection was initially reported on Twitter by security blogger The Harmony Guy.
Around 4.3 million people in the UK are due for a refund.
New social network on iTunes attracts more than one million users and more than its fair share of spam.
Okpako Diamreyan was also ordered to pay $1.02 million in restitution.
Sophos researchers report that Apple's new social network has been flooded with spam in the days since its launch.
The company has agreed to spend $8.5 million to settle a class action lawsuit.
The company recently acknowledged that the site was riddled with security vulnerabilities.
Nine former employees have been accused of cloning customers' cell phones in order to make approximately $15 million worth of calls.
Microsoft was caught off guard by public disclosure of a new zero-day hole in Internet Explorer 8. But the hacker who published the exploit says he notified Microsoft in advance and only acted after the company ignored him.
At O'Reilly Gov 2.0 Summit, Gen. Keith Alexander, head of U.S. Cyber Command pledges that national security and individual privacy are not working at cross purposes.
The new version, intended to be more transparent and understandable, will take effect on October 3.
The creator of the best rap video on the subject of malware, hacking and botnets will win a trip to LA.
Zscaler's Michael Sutton has discovered a vulnerability that could provide hackers with remote access to copies of scanned documents.
Juan Javier Cardenas emailed more than 1,500 stolen credit card numbers to co-conspirators between March and May of 2009.
Google Chrome 6 repairs 14 security vulnerabilities.
The payment processor has already agreed to pay $60 million to Visa, $3.6 million to American Express, and more than $41 million to MasterCard.
In addition to new social networking features and GUI improvements, iTunes 10 patches 13 known vulnerabilities.
Microsoft says it is shipping the newest version of an administrator's tool that helps manage key mitigation parameters in order to help corporate customers stay safer.
Personal data on 150,000 Schlecker customers was recently made available online.
The group is accused of disabling victims' PCs via the WinLock Trojan, then demanding payment to repair the damage.
The funds were stolen after a computer belonging to the university's comptroller was compromised.
The mobile phone company provides the user's phone number in response to any HTTP request sent by a web site.
Security Gateway Virtual Edition can be managed from the same platform as the physical version of Security Gateway.
Microblogging service alerts users to two changes to how third-party applications integrate with the site, raising privacy concerns in the process.
Infected PCs had been forwarding credit card details to criminals believed to be in Russia.
The worm can send messages in 13 different languages.
In a recent study, the vast majority of respondents said misconfigured networks are the easiest IT resource to attack.
The malware has been spreading via hacked Twitter accounts.
The country overtook the US during the month of August, according to security firm Network Box.
The Certificate of Cloud Security Knowledge exam is available via the CSA web site.
The announcement was made in conjunction with the VMworld 2010 conference in San Francisco.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?