- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
The company, called Okta, offers an on-demand identity and access management service.
The flaw allows customers to log in using several variations of an eight-character password.
The code covers the anti-virus engine, as well as the anti-phishing, anti-dialer, anti-spam, parental control, and other modules.
RealPlayer for Windows 11.0 to 11.1, 14.0.0 and 14.0.1 are affected.
Several services were taken offline in response to the attack, including the CVS system, Web-based code browsing, file upload capability and interactive shell services.
The country's ambassador to NATO called the virus 'very toxic, very dangerous.'
The e-mails ask for the merchant's store number, user ID, tax ID, phone number and password.
Version 11.01 fixes a total of five vulnerabilities.
Researcher Deral Heiland says printers are not typically secured as stringently as computers.
The FTC says Marc D'Souza and Maurice D'Souza sold more than a million fake anti-virus products.
An individual security professional at #Sigdie on EFnet IRC claimed responsibility for the attack.
According to Akamai, 10 percent of attacks from mobile networks in the third quarter of 2010 were directed at Port 23.
Microsoft has released a security advisory about a newly disclosed security hole and proof of concept code, but no attacks yet.
At least three government Web sites were knocked offline.
The WikiLeaks fallout continues as British authorities have detained alleged hackers involved with a group that targeted companies that cut off service to the whistleblower site.
Ron Wyden plans to introduce a bill requiring that law enforcement agencies receive a warrant before accessing location data.
The Mail & Guardian was recently taken offline after a series of attacks.
Employees' health benefit statements were delivered to the wrong addresses.
Version 6.0 will include sandboxing virtualization technology.
CloudPassage recently announced the availability of Halo SVM and Halo Firewall.
Version 1.3.05 of the SpyEye builder appears to be the result of the merger, according to Trend Micro.
School lunch prices were reset to $9,000 per meal.
'Zero Day' was written by Microsoft Technical Fellow Mark Russinovich.
The Federal Financial Institutions Examination Council may seek to clarify its existing guidelines on authenticating users.
The intrusion doesn't appear to have resulted in any changes to the Fedora software.
Facebook CEO learns firsthand just how vulnerable everyone using social networking sites can be after someone accessed his fan page and began posting status updates.
An older version of the bot code was recently made available for free in several underground forums.
The hackers posted a statement inviting supporters to a restaurant for an 'end-of-term party.'
Security software vendor Kaspersky has discovered a new fake anti-virus software campaign making its way around the popular instant messaging service.
Dave Rice is the author of 'Geekonomics' and a former National Security Agency cyber security analyst.
The Spectrum appliance is designed to sit at the Internet gateway to examine network traffic.
The malware distributed in the attack has a very low detection rate, according to VirusTotal.
The browser extension, called 'Keep My Opt-Outs,' enables users to opt out of tracking cookies from online ad networks.
CoreTrace is bringing its Bouncer technology to the Linux and Mac platforms to shore up security via to application whitelisting.
A Reserve Bank of India working group has issued more than 60 recommendations to help banks improve their information security.
The new variant adds RC4-based encryption for the communication protocol, among other enhancements.
Prices range from $33 to $499, depending on the importance or popularity of the site.
Trusteer has detected 26 Zeus configurations that target Money Bookers, and another 13 that target Web Money.
The bug affects the latest version of the browser running on Windows 7 and Windows XP SP3.
Credit card details submitted to lush.co.uk between October 4 and January 20 may have been compromised.
The company says its users' e-mail addresses and passwords may have been compromised.
The malware is designed to steal data from mobile devices running Android.
The Trojan is designed to block access to cloud-based services from Chinese firms Kingsoft, Qihoo, and Rising.
More than $150,000 was stolen from a single business after the company received an e-mail containing malware.
The data included names, mailing addresses, e-mail addresses, courses attended, and cost of those courses.
The scam threatens victims with a fine for having visited WikiLeaks.
The scam tries to lure victims with the promise of MasterCard rewards.
New phishing scam detected by security software vendor AppRiver attempts to steal customers' banking, credit card data.
Patients' names, dates of birth and treatment information were exposed.
Security researchers at Kaspersky Lab are warning of a new fast-moving Twitter worm that's redirecting people to a bogus anti-virus software site.
According to a recent California appeals court ruling, e-mails between an attorney and a client are not confidential if they're sent from the client's work e-mail account.
The e-mail asks the player to apply for a staff position, then collects his or her user name and password.
Jamie Schwettmann and Eric Michaud recently warned of severe flaws in the security devices used to alert inspectors to tampering.
The Government Accountability Office says the rapid adoption of smart grid technology could leave the U.S. open to cyber attacks.
The registry was disconnected from the EU and UN carbon trading registries in response to the attack.
Daniel Spitler and Andrew Auernheimer will each be charged with one count of conspiracy to access a computer without authorization and one count of fraud.
Dnevnik.org reports that Danchev has been hospitalized since December 11, 2010.
The DETERlab testbed provides an isolated 400-node mini-Internet for investing malware and other threats.
Version 0.2.1.29 of the software addresses several vulnerabilities.
AV-Comparatives recently gave its Product of the Year award to F-Secure Internet Security 2011.
A recent update patches two security vulnerabilities.
While a final bill still must still overcome significant jurisdictional hurdles, aide to Senate majority leader says bringing cybersecurity legislation to a floor vote is a priority this year.
What better place to give out tools aimed at making systems more secure than one of the premier hackers' conferences?
Valarie Burks is the agency's new deputy CIO for Information Technology Security.
According to the New York Times, the two countries jointly developed the worm in order to sabotage Iran's nuclear program.
The social networking site has begun providing app developers with access to users' addresses and phone numbers.
The funding will be used to enter the European security market, strengthen product offerings, and boost international sales and marketing.
The e-mails claim that recipients' accounts have been suspended because of violations of the Patriot Act.
A new spam campaign alleges that the recipient has been charged a fee by a leading German airline.
A hacker calling himself 'PkinJ0r' took credit for the attack.
Several employees were fired after millions of customer records were exposed online.
The hacked server stored patients' names, social security numbers, medical diagnosis codes, addresses, and other details.
High profile sites have been redirecting users to fake online stores.
Dancho Danchev has been missing since August of 2010.
Worm_Rixobot.A has been spreading via infected porn sites, IM applications and infected USB drives.
The tool is designed to remove Backdoor.Lavandos.A.
Despite the judge's recommendation that he serve his time at a halfway house, David Kernell is now in federal prison.
Three sites run by the DUP were recently replaced with Irish language versions.
A stolen laptop contained years of cancer research data which had never been backed up.
The file installs a Trojan identified by Sophos as Bckdr-FRM.
Versions 1.2.14 and 1.4.3 were recently released.
The company also published a workaround for administrators who can't apply the patch immediately.
DigiNotar is licensed as an official Dutch certification authority.
The malware was found on the system before it was able to cause damage.
The company is also seeking a temporary restraining order against the group.
Students studying cyber security at the University of Texas at San Antonio will receive up to $56,000 during their last two years of study.
The acquisition is intended to provide SAP's customers with improved security.
Thomas Roth used custom software running on EC2 to break into a WPA-PSK protected network in about 20 minutes.
The agency recently experienced several data breaches that it didn't report publicly.
The two suspects are accused of launching denial of service attacks against rival sites.
The drop in spam volumes over the holidays remains unexplained.
An audit of the University of Maine's IT systems found four areas of high risk.
Dillon Beresford says he tried to contact the vendor but received no reply.
Does cheaper compute power thanks to the cloud mean that hackers can use publicly-available resources to break into low-cost networks?
The soda giant is being targeted by a phishing scam that offers some quick cash in exchange for a litany of personal information.
The site was recently hacked and defaced.
The North Korean heir apparent's YouTube channel and Twitter account were recently compromised.
The worm lures victims with the promise of a photo viewing application.
The service is designed to help people get Zeus botnets up and running.
The hack resulted in the compromise of personal information on 2,000 supporters of the Irish political party.
Mono 2.8.2 patches a security flaw in the software platform.
The application is designed to protect Android devices in four key ways.
Versions 5.3.5 and 5.2.17 were recently released.
Adrian Crenshaw has developed a keystroke logger that can be concealed in a mouse.
John Kane and Andre Nestor have been charged with computer hacking and conspiracy.
Nick Pack and others have installed Gingerbread on an iPhone 3G.
The company says the updates will improve fraud detection by 29 percent.
Latest security threat to the online payment service attempts to snare users' login and password credentials.
Mac OS X 10.6.6 includes a single security fix.
The company purchased Immunet for $21 million.
The attackers accessed a database containing a wide range of personal information on members, owners, employees and beneficiaries.
The hacked accounts are being sold at taobao.com.
MessageLabs reports that spam volumes have dropped more than 50 percent since Christmas.
Google researcher Billy Rios published the method on his personal Web site.
The new apps store for Apple's Macs opened its doors on time and had a spectacular showing on its first day, but perhaps the company opened them too broadly, if the complaints about the store's anti-piracy protections are to be believed.
Non-profit identity theft prevention organization says shoddy reporting keeps consumers in the dark and at greater risk.
U.S. Commerce Secretary Gary Locke announces a National Program Office focused on steps to ensure trusted online transactions. Can it work?
The center is being built as part of the White House's Comprehensive National Security Initiative.
The audit determined that the agency needs to strengthen cyber security in four key areas.
Mahmud al-Mabhouh's computer was bugged prior to his assassination in January 2010.
According to Information Security Media, 48 percent of small and mid sized banks faced phishing attacks in 2010.
Google Apps users now have the option of adding email authentication to validate email and head off spam messages.
The e-mails are designed to trick subscribers into disclosing a wide range of personal information.
Last year saw the creation of 34 percent of all malware that has ever existed.
Version 1.1 of the open source web analytics solution patches several vulnerabilities.
Security researchers are warning of a highly critical vulnerability in the disk burning application.
The company says it has not yet detected any attempts by attackers to target the vulnerability.
The attack was dedicated to Facebook CEO Mark Zuckerberg.
Trusteer reports that mobile users are three times more likely to submit their login details to phishing sites than desktop users.
Users are advised not to open files from unknown sources until a patch is released.
Microsoft issued a security advisory for a bug in Windows Graphics Rendering Engine, and is working on a patch.
The foundation says cyber security has become a 'fundamental weakness' in Australia's national security.
The ISIS says IAEA reports support the possibility that Stuxnet was responsible for the issues with the centrifuges.
The attack has successfully stolen gigabytes of data from dozens of victims.
A similar bill was introduced, unsuccessfully, in 2004 and 2005.
The attack was launched in response to the Tunisian's government's ban on access to WikiLeaks.
The Security-as-a-Service provider expands Dell's IT portfolio with a number of security, threat management and compliance services.
The Department of Homeland Security says Tram Vo and Khoi Van are responsible for $1.25 million in fraudulent charges.
Researchers at the Shadowserver Foundation are warning of a new attack.
Step-by-step instructions are available for rooting the device, allowing users to download and run Android apps.
At the 27th Chaos Communication Congress, Julia Wolf recently described several significant flaws in the standard.
Karsten Nohl and Silvain Munaut recently demonstrated a toolkit that enables them to eavesdrop on phone calls and text messages.
A Google security researcher has written and released a hacker's tool to help find flaws in browsers, particularly Internet Explorer.
The UK Cards Association has tried to block publication of a paper that reveals some of the limitations of chip-and-pin tech.
Government web sites were recently targeted by a denial of service attack.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?