- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
The company has released a patch for the vulnerability.
Sophos researchers warn of new trojan targeting Mac OS X.
The update fixes a high risk security flaw in the DNS server software.
Dan Wallach says Android devices don't encrypt data sent to and from Facebook and Google Calendar.
Dmitry M. Naskovets has pleaded guilty to conspiracy to commit wire fraud and credit card fraud.
The Defence Signals Directorate is working with Apple to certify iOS for government use.
The e-mails claim that users' accounts have exceeded allowed storage limits.
As a wave of new governors sweeps into office facing major budget shortfalls, states' top tech officers want to keep cybersecurity off the chopping block.
Following a quick round of fundraising, more lawyers will be hired for George Hotz's defense.
The hacker says he took the site down for 'celebrating the death of U.S. troops.'
The new version explicitly prohibits any U.S. official from having the authority to shut down the Internet.
Mitmo is now targeting Polish customers of ING Bank.
A new policy paper highlights the security and privacy concerns generated by next-generation cookies.
Updating the Flash player isn't enough to protect against Flash vulns that could be lurking inside applications.
Version 0.97 of ClamAV was recently released.
According to Qualys, almost 80 percent of browser users are made vulnerable by plug-ins.
The company recently launched a Mac version of its Discoverer solution.
The news service's landing page was replaced.
The malware keeps online banking sessions open after the user has logged out.
Andrew McAfee recently found it's easy to learn what music, videos and apps an iTunes user has purchased.
Users received e-mails claiming that the database had been 'closed due to AIDS.'
The vulnerability lies in the BROWSER protocol.
Adrian Ghighina will be sentenced on May 9.
74 members and associates of the Armenian Power gang were recently arrested.
The majority of the funds will be spent on developing new forms of defense for infrastructure systems.
The new cloud-based solutions are designed to help companies defend against DDoS attacks.
A fake page includes .ru after the facebook.com address.
The malware has thus far only been distributed on Chinese third-party mobile app stores.
McAfee will integrate its security software into Wind River System's OS for embedded devices.
The report has already by criticized by researchers for its questionable calculations.
The attacks penetrated computer networks at the Finance Department and the Treasury Board of Canada.
The smartphone security suite includes anti-virus, anti-theft, and a filter for calls and text messages.
The U.S. Department of Homeland Security recently took down all 84,000 of mooo.com's subdomains.
Cisco reports that enterprise users experienced an average of 135 Web malware encounters per month.
RSA launches Cloud Trust Authority, debuts Security Incident Management and joins forces with McAfee.
The company says e-DMZ's technology will help expand its One Identity portfolio of identity and access management solutions.
According to Orthus, only 18 percent of NHS trusts have an encrypted wireless network.
Symantec Endpoint Protection 12 will soon be available in beta, and will be officially launched later in the year.
Personal data on nearly 1.7 million patients, staff, vendors and contractors was recently stolen.
Version 4.1, which adds an integrated vulnerability scanner, will be released later this month.
The unidentified man tried to blackmail Nintendo using stolen customer data.
The threat was detected by only nine of the top 43 anti-virus solutions.
A video shown at a party for Gabi Ashkenazi claimed the Stuxnet worm as one of his major successes.
Julian Oliver and Danja Vasiliev built the device to show how easy it is to manipulate 'trustworthy' news.
The spending is part of a $147.9 billion FY 2012 budget for federal science and technology programs.
The company's spot on the RSA exhibition floor has been replaced with a sign explaining its decision to pull out of the show.
New study from Qualys using months of data from browser checking service identifies the most vulnerable browser plug-ins.
The Ambulance Service of New South Wales says no lives were put at risk.
The security vendors team up to demonstrate how modern drive-by download attacks occur and what site owners can do to prevent themselves from being victims.
The company says popular apps, including Angry Birds and Monkey Jump, are being pirated and repackaged with malicious code.
The company says Matt Miszewski stole more than 900 files containing business plans for 2011.
New security framework brings TrustSec to firewalls and expands overall awareness of security throughout the network.
Three sites were targeted once, one was hit twice, and one was targeted three times.
IBM unleashes its most powerful network security IPS ever in an effort to help secure the biggest networks as fast as possible.
Integrating the two firms' security products to provide a "holistic" approach to enterprise-wide views.
The company's unified Internet security solution combines messaging security, Web security and anti-virus in a single suite.
Hacker Topiary recently stated on Twitter, 'Anonymous is now in possession of Stuxnet.'
The group recently released 27,000 more e-mails acquired during its hacking of HBGary's network and servers.
Hacker Gary McKinnon is under the care of autism expert Jeremy Turk.
The company has begun replacing abusive images with alerts to potential victims.
That cute little hedgehog that says 'My heart is yours' is actually racking up massive premium SMS charges.
Philip Virgo says the UK's Police Central E-crime Unit isn't ready to manage the cyber security risks of the 2012 Olympics.
Microsoft's newly proposed "global Internet health model" is aimed at mitigating the risks associated with the convergence of mobile devices and the cloud.
The company plans to use 3LM's technology in its own phones, and to market the technology to other handset makers as well.
New effort spearheaded by Qualys takes flight to create a new type of Web Application Firewall (WAF).
HP vice president helps to fill out details of the company's security vision for enterprises in the wake of last year's buying bonanza.
Virtual gateway security debuts to help secure virtual assets from real attacks.
Versions 220.127.116.11 and 18.104.22.168 fix a patch disclosure vulnerability.
The worm was one of the first to be created from a toolkit.
The blueprint is being offered for free at the RSA Conference in San Francisco.
The hacker claims to have acquired a wide variety of information on EDL leaders, donors and forum users.
The malware applies pattern analysis to voice calls in order to predict their likely content.
RecruitIreland says the exposed information was limited to users' first and last names and e-mail addresses.
The company recently added an optional two-step verification feature.
Dino Dai Zovi and Charlie Miller recently demonstrated a zero day exploit for the browser.
The dating site has told many of its users to change their passwords following a security breach.
Five unnamed companies are confirmed victims of the 'Night Dragon' attacks.
Versions 2.3.11 and 3.0.4 were recently released.
A script provides access to the passwords saved in the keychain.
The appliance is sold on a per-user subscription basis.
ACRAnet Inc., SettlementOne Credit Corporation, and Statewide Credit Services have agreed to obtain independent security audits.
A patch is available from the Plone Foundation Web site.
Hackers posted a message in Donna Lichtenegger's name claiming that she enjoys receiving gifts from lobbyists.
The PlayStation 3 master signing key was recently retweeted by fictional VP Kevin Butler.
New Advanced Intelligence (AI) technology makes log and SIEM data actionable for network defense.
A simple screen grab can be used to steal a user's full account details.
A pair of laptops containing personal data on approximately 1,700 people were stolen from an employee's home.
Version 3.0.5 addresses two vulnerabilities.
Edward Markey and Joe Barton want more information on the company's plans to provide developers with access to user data.
The security firm says mobile malware threats increased by 46 percent last year.
Content was added to the network's Arabic site in order to distort its coverage of protests in Egypt.
Yevgeny Anikin was given a five-year suspended sentence.
New version of Windows desktop anti-virus released with continuous cloud updating and customization features.
More than 60,000 company e-mails were posted to The Pirate Bay.
The e-mails include an attachment containing a Trojan installer.
Bulgaria, Malta, Slovakia, Hungary and Italy had the highest infection rates.
Dasient will use the money to expand sales and marketing, as well as research and product development.
The latest version of the market allows users to download and install apps to an Android device remotely.
The company says there's no evidence that any customer information was accessed or acquired.
BoxSentry's new name is intended to provide a clearer description of the company's services.
Microsoft says the software is being sold to fund the cartels' operations.
The company recently introduced a cross-site scripting detection service.
Kaspersky Lab reports that spammers used the WikiLeaks name to bypass spam filters, and to persuade recipients to forward bogus links.
The group is organizing distributed denial of service attacks against government Web sites.
Despite fears to the contrary, the Hoover Dam and similar facilities are not connected to the Internet.
Versions 9.0.3, 8.4.7, 8.3.14 and 8.2.20 were recently made available.
The software tools are intended to help SMBs secure, manage and protect their networks.
The solution is designed to offer full virus and malware protection to Mac users.
The university stored sensitive documents about its security procedures on a unsecured server.
The company recently released a firmware update for its FortiWeb Web application firewall.
The wide array of potential entry points to a network created by the use of social media sites pose a challenge for network managers.
Ashley Mitchell transferred 400 billion gaming chips from Zynga's system into fake Facebook accounts.
The new designations include IOS Security Specialist, VPN Security Specialist, and Firewall Security Specialist.
Traxcom Technologies' Secure Access product portfolio is expected to improve the security of NewNet's offerings.
Version 1.0.2 addresses several cross-site scripting vulnerabilities.
SecureSurf filters Web traffic to block malware, adware and viruses.
The AP says the attacks were aimed at spreading panic among markets.
The e-mails seek Bank of America customers' personal information.
Software vendor Panda Security reports that new pieces of malware are taking advantage of people's obsession with the social networking site.
The Electronic Frontier Foundation says the FBI committed the violations with the help of third parties, including phone companies, ISPs and others.
Version 4.74 patches a privilege escalation vulnerability.
The e-mails appear to be official notices from the Italian credit card provider.
According to Der Tagesspiegel, it's relatively easy for anyone to maliciously manipulate bookings.
Prizes include college scholarships, gift certificates, and letters of recognition.
The Mobile Control solution is designed to enable enterprises to apply security controls to a wide range of mobile devices.
AppRiver's January Threat and Spamscape notes a surge in new tax-related malware campaigns and the impact of the Rustock botnet on total spam production.
The botnets are being used to launch attacks against manufacturers of industrial food processing equipment.
The agency is seeking papers and proposals on 14 different topic areas.
Simon Walker, Alan Steer and Jack Dipper will head to the Masterclass in Bristol on March 5.
Almost 30 million users' personal information was exposed.
Three men stole 10 laptops containing sensitive information.
According to HostExploit, VolgaHost has been offline since January 17.
Razor, priced at $23,500, is expected to ship in February.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?