- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
Version 1.6.4 of the open source CMS patches four vulnerabilities.
Critical security update issued for open source WordPress blog as next generation release nears completion.
A group of pro-democracy activists is asking hackers worldwide to help them expose government corruption.
The compromised data includes names, user IDs, passwords, e-mail addresses, and more.
TDL-4, the researchers say, is a vast improvement over previous versions.
The attacks are in response to the arrests of members of a charity that feeds homeless people.
No arrests were made, according to local media reports.
A Symantec report entitled 'A Window Into Mobile Device Security' looks at the security approaches of both operating systems.
The hackers uploaded a file called Zimbabwe .gov SQL Dump to Megaupload.com.
The lawsuit accuses Dropbox of violating the California Unfair Competition Law, as well as invasion of privacy and negligence.
According to GFI Software, the attacks were first launched on June 23.
The teenager was diagnosed with Asperger's syndrome while in custody.
D3V29 stole user names, passwords and account balances via open wireless networks.
Version 2.9.0 addresses a vulnerability caused by corrupt buddy icons.
A database of 300,000 usernames and passwords was accidentally published online.
Hackers posted a link to a banking Trojan on the actor's Twitter account.
George Hotz apparently began working at the company on May 17.
Twitter user @ibomhacktivist has claimed responsibility.
Kenneth Joseph Lucas II was one of 100 people arrested as part of Operation Phish Phry in 2009.
And these are just the ones we hear about.
Approximately 100 users' accounts were accessed.
After 50 days of high-profile hacking, the group is calling it quits.
TeaMp0isoN released the information in response to Blair's support for the war in Iraq.
Hacker Warv0x says he exploited an SQL injection vulnerability.
Password cracking tool gets a big boost from a pair of security industry vendors.
The company has updated a Q&A to confirm the attack.
The bank says its customers will not be liable for the losses.
The company's co-founder is accused of hiring a hacker to attack rival payment processing firms.
The customer database for the E-Bookshop service may have been stolen.
Authorities say the ring was being run by three men in the city of Braila.
The update patches 39 vulnerabilities, including five in QuickTime.
The lawsuit alleges that Sony knew its security was inadequate prior to the attack.
The Arizona Department of Public Safety has acknowledged that its computer systems were compromised.
Daniel J. Fowler faces up to 15 years in federal prison and a fine of up to $500,000.
Daniel Spitler faces up to five years in prison and a $250,000 fine.
The National Cyber Range will enable testing of possible cyber attack situations that could happen on the real Internet.
The acquisition will add static code analysis technology to WhiteHat's offering.
The Cybercrime Legislation Amendment Bill 2011 brings the country in line with the Council of Europe Convention on Cybercrime.
Several customers have been spammed after e-mail addresses were stolen from the hotel chain.
A Ponemon Research survey found that 60 percent reported two or more breaches in the last 12 months.
Backdoors were found in AddThis, WPtouch and 3 Total Cache.
Sentry's tech will be integrated into AdaptiveMobile's Network Protection Platform.
The vulnerability could allow a malicious NFC tag to send incorrect information to a Nexus S device.
The startup's tech is designed to secure application clouds and virtual desktops as well as rich client devices.
The Web host and registrar was hit by two denial of service attacks earlier this week.
Many of the enhancements in the new release were suggested by users.
GGTracker signs victims up to premium SMS subscription services without their consent.
The unnamed 19-year-old was arrested following an investigation by several intelligence agencies, including the FBI.
MyPageKeeper was designed by students at the University of California at Riverside.
In response, StartSSL has temporarily suspended all certification services.
The updates patch several bugs in the open source browser and e-mail client.
The groups are working together to target banks, government agencies and other high-profile organizations.
The company says the breach did not involve payroll data and only affected a single client.
The malware, jSMSHider, targets a vulnerability that was closed in version 7.0.3 of CyanogenMod.
Hackers Idahc and Auth3ntiq claim to have accessed 177,172 e-mails.
Chetan S. Bendale is accused of taking over oDesk's domain name registration account, then demanding $1 million from the company.
For almost four hours yesterday, users were able to log into any account without a password.
Thousands of e-mail addresses and passwords for Distribute.IT were published online.
The company has warned approximately 1,500 customers that their computers are infected with the SpyEye Trojan.
Both men were convicted of copyright theft and computer intrusion, and one was also convicted of extortion.
SUPERAntiSpyware's 10 employees will join Support.com full-time.
The vulnerabilities were found in two products from Beijing-based Sunway ForceControl Technology.
E-mail addresses, dates of birth and encrypted passwords were stolen from the SEGA Pass user database.
The Web site was taken down for several hours on Wednesday evening.
A new variant specifically targets Air Berlin and AirPlus customers.
The malware, Infostealer.Coinbit, specifically targets Bitcoin wallets.
At least 18,000 user account credentials were stolen.
WPScan is designed to help admins assess the security of their WordPress installations.
The Cyber-Abwehrzentrum in Bonn is intended to help defend the country's critical infrastructure.
The premium version of the Android app will check links for phishing scams or malware.
The man threatened online betting sites with DDoS attacks during the World Cup.
Malicious code was planted on the company's Web site.
A laptop containing 8.63 million people's unencrypted medical records has gone missing.
The updates patch a flaw in Microsoft Excel that could enable remote code execution.
Blogger Cameron Slater has refused to destroy the data he accessed.
Online fraudsters were detained in China, Taiwan, Cambodia, Indonesia, Malaysia and Thailand.
The denial of service attack was launched in response to the recent arrest of three hackers linked to the group.
The Cyber Red Team will be focused on helping to detect and respond to cyber attacks.
E-mail addresses and encrypted passwords were stolen.
An analysis of the posted data suggests that no sensitive information was compromised.
Fifteen of the vulnerabilities are rated critical.
Security pros have plenty of demands on their time when it comes to installing June's Patch Tuesday patches.
Version 6.3 of the database security, risk and compliance platform will incorporate new blocking functionality.
The company says the vulnerability could have allowed attackers to capture and replay management commands.
The group released 26,000 e-mail addresses and passwords from members of the porn site, including .gov and .mil users.
The GET request for an RSS feed includes the driver's latitude, longitude, speed, direction and destination.
A significant amount of data was stolen, including documents and e-mails.
Eight of the 32 people detained were under 18 years old.
The scam uses a copy of the Microsoft Update site -- but only works on Firefox.
According to the security firm, several popular iPhone and Android apps have significant security issues.
The money was stolen from the Town of Pittsford's online commercial banking account.
Zeus said it made the acquisition in response to increased demand for Web application security.
Trevor Harwell surreptitiously captured hundreds of webcam images of Mac repair customers.
The suspects were arrested in Barcelona, Almeria and Valencia.
Judge John Rich ruled that Ocean Bank is not responsible for covering the theft of almost $300,000 from a customer's account.
According to the lawsuit, the student's parents were shown 4,404 webcam photos and 3,978 screenshots taken via his MacBook.
The 18-year-old, known online as 'nsplitter,' is accused of hacking into Interpol, the Pentagon, the FBI and the NSA.
NCC's Chicago office will become a new regional office for ePlus.
Eddie Schwartz was formerly the CSO of NetWitness.
The company says hundreds of thousands of customers' personal data may have been accessed.
Some of the vulnerabilities patched could lead to arbitrary code execution.
Members of the iPhone Dev Team claim to have jailbroken the OS using limera1n.
Cigital says the acquisition will help it expand its scope in the hospitality and retail industries.
The Information Security Forum recommends that enterprises implement a strong acceptable use policy for personal devices in the workplace.
The hackers planted a press release saying Stephen Harper had been flown to a hospital after choking on breakfast.
Chrome 12 debuts as Google ups the ante in the battle against malware.
The Xfinity Home Security service will be made available in six new cities across the U.S.
The move was announced in a letter to customers on Monday.
The malware attempts to disable anti-virus programs and steal financial information.
According to researcher Irfan Asrar, Android.Lightdd doesn't require any complex steps to restore a device back to its pre-infection state.
According to an article in The Guardian, hackers are easy to break when faced with threats of long prison sentences.
Version 1.1.10 addresses several issues found in the previous update from two months ago.
Version 12.0.742.91 also gives users the ability to delete Flash cookies.
E-mails claiming to come from YouTube link instead to a Web site selling Viagra, Cialis, Levitra and other drugs.
FaceNiff can be used to steal unencrypted cookies over Wi-Fi networks.
On Tuesday, the company will release an update to patch 17 vulnerabilities.
Although no user data was compromised, Facebook is working with Scotland Yard and the FBI to investigate the attack.
The LulzSec hacker group recently defaced the infragardatlanta.org Web site.
Joseph B. Campbell hacked into between 350 and 500 webmail accounts.
The hackers inserted a cake recipe to replace bomb-making instructions in an Al Qaida magazine.
MobileSecurity is designed to protect Android devices from viruses, malware and spyware.
The company recently released its third security update in as many days.
The new Wireless Desktop 2000 incorporates 128-bit AES encryption.
The Pakistan Cyber Army says it stole personal data on 40,000 customers, along with several pieces of source code.
A new campaign targets users of the social network with fake invitations to connect to other members.
Standalone System Sweeper Beta is designed for use when a PC can't be started due to a malware infection.
Both vulnerabilities can be leveraged to compromise a user's system.
An unsecured server contained a file with customer names, account numbers, address, phone numbers and some e-mail addresses.
The biggest difference between this challenge and last year's is the increased frequency of competitions.
The service is free with an Xfinity Internet service subscription.
Panda's new anti virus product line provides enhanced protection for social media as well as encryption and shredding for more complete protection.
Google points the finger at China for email hack.
The hackers claim to have accessed unencrypted personal data on over 1 million people, along with admin details, music codes, and music coupons.
Versions 1.2.17 and 1.4.7 address multiple vulnerabilities.
The attacks leverage information gained from a breach at RSA.
LulzSec says its attacks are the "beginning of the end" for the company.
A new variant of MacDefender avoids detection by Apple's new security protections.
The Defense Department report is its first official document on cyber strategy.
The critical vulnerability was discovered by researchers at Ruhr-University Bochum.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?