- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
Two hard drives were recently seized from Tailor Made Services in Dallas.
The company says the new Trojan is the most sophisticated Android malware it has seen to date.
Version 3.0.4 patches a serious vulnerability in the blogging software.
The hack could allow pirated or counterfeit games to be run on a PlayStation 3 console.
The names, login names, e-mail addresses and vehicle identification numbers for more than 2 million of the company's customers were recently stolen.
The hack enables users to install any Windows Phone 7 application from the marketplace for free.
Leon Walker could go to prison for accessing his wife's email account.
The attack can provide a good idea of the sites an anonymous surfer is viewing.
After medical information was stored on Yahoo! Calendar, notifications of a possible breach were sent to 878 affected patients.
One-time passwords will be required in order to authorize phone banking transactions starting on January 1, 2011.
The attackers stole approximately 800 credit card numbers from the site's visitors.
The forum was recently knocked offline by a denial of service attack.
For all the talk and activity in Congress and at federal agencies, did the needle really move on Internet privacy in 2010?
The center will be modeled after the NATO Cooperative Cyber Defense Center of Excellence as well as cyber security centers in the US and the UK.
Developer James Whelton uncovered some hidden features of the device.
The emails distributing the Trojan aren't detected by many spam filters.
Daniel Balsam quit his job, enrolled in law school, and started a new career suing spamming companies.
44,000 old user accounts were recently disabled after the account info was found to be on a publicly available server.
The lawsuit alleges that the company allows mobile apps to send personal information to ad networks without users' consent.
Evan Kane is accused of stealing 15,000 social security numbers from the State of New York's Office of Temporary Disability Assistance.
The forum for trading stolen financial data was recently hacked for the second time this year.
The company has announced plans to acquire ETI A/S for $212 million.
US Rep. Mac Thornberry (R-Texas) will lead the initiative in the next Congress.
The US Federal Trade Commission has approved the company's acquisition of McAfee.
Barry Vincent Ardolf admitted possession of child porn, computer hacking, aggravated identity theft, and making death threats.
The flaw can enable hackers to inject malware onto vulnerable systems.
Jeremey Parker has been charged with stealing approximately $270,000 from Digital River.
The MMA wants consumers to have a clearer sense of how information is gathered.
The breach occurred in company data centers in North America, Europe and Asia.
Lookout Mobile Security now has nearly 50 employees and about four million registered users.
A large percentage of human rights and independent media sites have been hit by DDoS attacks.
PandaLabs' Luis Corrons says the Mac's increasing popularity will inevitably result in an increase in the number of threats.
The company will pay $490 million to acquire Applied Signal Technology.
The update caused problems for users connecting to third party e-mail products.
The latest version of W32.Yimfoca blocks access to Facebook until the victim completes a survey.
The emails tell customers their accounts have been suspended, and ask for updated credit card information.
Researchers have noted an increase in the amount of malware posing as disk utilities.
Version 1.3.3d patches a critical vulnerability.
A team of Canadian researchers recently created an isolated version of the Waledac botnet.
Hackers recently accessed the personal details of the far-right group's supporters.
The weakness of the technology was recently exposed by researcher Karsten Nohl.
Version 2.0 of the Secunia Personal Software Inspector was recently released.
Several cyber security provisions were removed from the House version of the FY 2011 defense authorization bill.
The company plans to overhaul its web infrastructure.
Rob Wainwright has suggested a reporting mechanism along the lines of the Internet Crime Complaint Center in the US.
The group had caused more than $13.5 million in losses to companies in the U.S., Britain, South Africa, Italy and Romania.
The new warnings are focused on sites that are compromised but are not actively infecting computers.
Avira reports that 25 percent of consumers have turned the software off because it was slowing down their computer.
The California Department of Public Health recently lost a magnetic tape containing unencrypted personal data on up to 2,550 people.
The breach resulted in the theft of 110,000 customers' credit card data.
The former employees are accused of copying a confidential database containing information on clients of U.S. Trust.
A German computer consultant says the malware set back Iran's nuclear program by two years.
MWR InfoSecurity researchers have developed a proof-of-concept exploit for the flaw.
Exploits for the Android operating system rose by 400 percent from 2009 to 2010.
The report has been criticized for emphasizing self-regulation by the online advertising industry.
The software titan has released version 2 of its free security package that adds a new anti-malware engine.
Open source penetration testing framework goes after Cisco in new release but Cisco isn't worried.
New report from Department of Commerce tees up issues for the executive branch to consider as it continues to develop its evolving approach to online privacy.
Updated enterprise security client features a new anti-malware engine and integration with System Center Configuration Manager.
Spamhaus recently issued a 'malware warning' for the site.
The Mountain Vista Medical Center recently lost data cards containing personal information on 2,284 endoscopy patients.
Concern is focused on sites run by the Department for Work and Pensions and HM Revenue & Customs.
The breach occurred through marketing company Silverpop.
The company has made a white paper available to help customers install the fixes.
Hackers repeatedly accessed a university server holding the names, social security numbers and birth dates of more than 760,000 students, faculty and former students.
The company has acknowledged a 'potential security issue' with its StorageWorks P2000 product.
According to security researcher Denis Sinegubko, the sites are used to sell counterfeit software.
Personal information on 200,000 suspects, victims, and informants was leaked online.
The group will pay between $500 and $3,000 for bugs found on a dozen of its Web sites.
The company's Network and Personal Security (NPS) solution is designed to address a wide range of threats faced by mobile operators and their customers.
In a Microsoft-commissioned study, IE8 and IE9 caught far more malicious sites than Firefox, Safari, Chrome and Opera.
Wins court cases against an accused counterfeiter and an unauthorized importer.
The Trojan is designed to hijack shortcuts on the user's desktop or in special folders.
Hackers recently stole personal data on an unknown number of McDonald's customers.
Palin's web site was recently hit with a denial of service attack.
DoubleClick and rad.msn.com have been found to be delivering malicious banner ads.
Users' e-mail addresses and passwords are now being shared on peer-to-peer networks.
The update patches 27 vulnerabilities in Windows RealPlayer 11.1.
The agency says businesses and consumers are at risk of data breaches through smartphone usage.
More than 60,000 former students and staff are just finding out that hackers had access to their personal data for more than two years.
A recent press release intends to explain Anonymous' recent attacks in support of WikiLeaks.
Users are advised to upgrade to version 3.0.3 as soon as possible.
The malware injects a legitimate-looking pop-up when an infected user visits a targeted retailer's card services web site.
The bill would require the establishment of minimum standards for Internet security.
Used hard drives containing sensitive data may have been sold to the public.
The 16-year-old is the first person to be arrested for participating in the ongoing attacks.
The teenager is suspected of involvement in a denial of service attack against the online game.
The update includes patches for critical security flaws that could allow attackers to overwrite memory contents with malicious code.
The attack disabled Paypal.com from late Wednesday until early Thursday morning.
According to a US State Department cable, Estonian officials believed the Russian government was behind the attacks.
Version 1.0.0c of OpenSSL was recently released.
The NIST, DHS and FSSCC signed a memorandum of understanding this week.
The site is now supported by 14 different name servers across 11 different networks.
The vulnerabilities affect both Windows and Mac OS X users.
The new worm is able to target users in 20 languages.
The company has 30 days to respond to the complaint from the Korea Communications Commission.
The majority of smartphone users plan to access sensitive data on their mobile device when they're out of the office.
A patent licensing firm founded by Microsoft's former chief strategist and CTO sues several leading security software firms for patent infringement.
An attack by Operation Payback brought down the company's web site as well as at least part of its payment systems.
The botnet's spam output has doubled over the last year to reach 44 billion spam emails a day.
The aim of the 10-year, $42 million plan is to strengthen the country's cyber defenses.
Version 5.601 addresses a 'moderately critical' flaw in the media player.
The use of the same vulnerability was originally detected during the initial analysis of Stuxnet.
Members of the group have observed the botnet launching DDOS attacks on more than 100 sites.
Two new technologies enable users to specify which sites are allowed to track them, and enable sites to publish lists showing what information may be collected.
Juniper Networks CEO Kevin Johnson's approach to mobile security helped separate him from the pack in 2010.
MobileManager 6.0 gives administrators more tools to monitor mobile devices in the enterprise and prevent costly data breaches.
The 2009 cable alleges that Chinese firms with ties to the military have hired several hackers.
Juniper Networks has purchased Altor Networks for approximately $95 million.
The consortium will develop ways to test and certify anti-malware, host intrusion prevention and detection, and personal firewall technologies.
The Pakistani Cyber Army recently defaced the CBI's web site.
The vulnerability affects Adobe Illustrator CS5 15.0.1 and earlier for Windows.
The suit accuses YouPorn of improperly accessing its users' browser history.
New DNS security signing solutions from VeriSign aim to help registrars to deploy DNS security tech as demand grows.
The IT security firm debuts Retina CS 2.0 Management Console to provide its customers with end-to-end vulnerability and compliance management.
A security feature in Internet Explorer 7 and 8 meant to keep users safe instead leaves a hole where users expect to be most secure.
The malware is linked to the Zeus Trojan.
The company says businesses need to educate employees about the risks involved in using Twitter.
A Siberian gang hired a virus writer to develop malware capable of infecting ATMs.
Due to denial of service attacks, EveryDNS has pulled the plug on wikileaks.org.
The attack requires no interaction on the part of the victim.
Kaspersky Labs reports that the volume of spam coming from Russia doubled in October.
A pair of German hackers claim to have accessed several pop stars' computers.
Until November 2009, the botnet was directly reponsible for a third of global spam traffic.
The company has provided instructions on how to repair damaged systems.
The flaw could allow a local user to gain additional privileges.
The attackers replaced the source file with a backdoor.
If you work in information security, the latest WikiLeaks controversy should have you considering how your company deals with securing its data.
The root cause of many cross-site scripting and SQL injection security vulnerabilities is input validation sanitation. IBMs new Rational AppScan 8 platform could help to mitigate or eliminate the problem.
The research firm says an attack could cause years of disruption to leading western economies.
Research In Motion's newest operating system is now FIPS 140-2 certified.
The fake anti-virus app is being advertised under the name of 'Windows Trojan Removal Kit.'
Google and Facebook are tracking users' behavior on the National Health Service web site.
As the legislative session winds down, lawmakers look ahead to the online privacy debate next year, with one prominent member announcing plans to back 'do-not-track' legislation.
Version 3.0.2 fixes a privilege escalation hole, along with two other vulnerabilities.
The company was informed of the vulnerability in September.
The latest attack exceeded 10 Gbps, according to a WikiLeaks Twitter post.
The Office of Management and Budget has ordered all federal agencies to review their procedures for protecting sensitive data.
The FortiGate-5001B combines firewall, VPN, intrusion prevention, identity-based application controls, anti-virus, anti-spam and Web filtering functionality.
The compromise was the result of a SQL injection attack.
Federal Trade Commission issues staff report calling for a browser-based mechanism to give consumers the option of blocking online marketers from building profiles about them.
According to Sunbelt researchers, the sites are being used to distribute the Bayrob Trojan.
Version 5.6 of the media player fixes two 'highly critical' flaws.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?