- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
The attackers are using a modified version of the Zeus Trojan called Gameover.
The e-mails come with attached ZIP files containing a Trojan.
Members of Anonymous and TeaMp0isoN plan to steal money from banks and donate it to charities and protest movements.
The company says its LaserJet printers have a 'thermal breaker' designed specifically to prevent overheating.
Early customers include Facebook and YouSendIt.
Credit card numbers, cardholder names, expiration dates, and encrypted debit card PIN numbers may have been accessed.
The Ministry of Defense says the loss of more than 150 laptops was 'almost inevitable.'
Leveraging open source ClamAV and the cloud, Sourcefire layers its antivirus tech on top of other vendors solutions.
Version 1.6.5 patches three security flaws.
The worm links to malware-laden sites containing a variant of the Zeus Trojan.
Members of TeaMp0isoN recently published more than 1,000 UN staff e-mail addresses, user names and passwords.
The fake messaging app sends SMS messages to premium rate numbers.
Salvatore Stolfo and Ang Cui say the vulnerability could be exploited to cause a printer to catch fire.
Versions 0.7.8 and 0.8.7 patch several vulnerabilities.
Names, user names, passwords and location information were accessed.
Dangerous flaw puts internal Web servers at risk, but there is a fix in the works.
Names, user names, encrypted resident registration numbers and passwords of players of the game Maple Story may have been accessed.
Whisper Systems announced the acquisition in a blog post on Monday.
The company eventually caught hacker Attila Nemeth with the help of the U.S. Secret Service.
The four hackers were allegedly financed by Jemaah Islamiyah.
Customers' credit card information may have been compromised.
The FinFisher spyware application exploits a flaw that was patched in iTunes 10.5.1.
According to an e-mailed statement, 'there was no malicious or unauthorized traffic from Russia or any foreign entities.'
Names, addresses, phone numbers, bank accounts and credit card information may have been accessed.
The company is enabling 'forward secrecy' for Gmail, Google Docs, SSL Search and Google +.
The lawsuit contends that the health care system was negligent in its security, and took too long to notify victims of the breach.
A list of customer e-mail addresses was made available online by mistake.
Developer plamoni has demonstrated a hack that enables the solution to control an Internet-connected thermostat.
Centrify Express 2012 seeks to ease the pain of IT professionals tasked with integrating Unix, Linux and Mac with Active Directory.
The new version will be made available to the general public by the end of 2011.
The amount of malware aimed at Android devices increased by 37 percent from the second quarter to the third quarter of this year.
Michael Capozzi and Daniel Scaleb have posted detailed instruction on how to make an iPhone 4S compatible with T-Mobile's network.
The device was rooted by the same developers who rooted Amazon's Kindle Fire.
Stolen information may have included Social Security numbers, birth dates and other data.
The group published 38,000 e-mails from the account of cybercrime investigator Fred Baclagan.
IT salaries overall are expected to increase by 4.5 percent next year, and data security analysts' salaries will rise by 6 percent.
The hacker, who calls himself 'pr0f,' says he has hacked into several SCADA systems.
The company has warned targeted subscribers of an 'organized attempt' to access their online accounts.
The blast at an Iranian Revolutionary Guard missile base killed all attending technicians.
The flaw could allow an attacker to insert arbitrary code into a page.
Security researcher Peter Kleissner has developed a new version of his Stoned Bootkit.
At least 10 different cyber attacks were discovered in the last year.
The Senate Majority Leader plans to bring cyber security legislation to the floor of the Senate for debate early next year.
A variety of messages lead to fake YouTube pages, where victims are tricked into downloading malware.
Computers had out of date software, missing security patches and misconfigured firewalls.
The company led the quarter with 82 reported flaws, followed by Oracle and Microsoft.
The updates patch a vulnerability that could be exploited to change a user's password.
In a rare move, Google is updating Chrome for a single security fix.
The attackers were able to burn out the pump after accessing its industrial control system.
The fake version of Office Genuine Advantage is spreading via Yahoo Messenger.
A stolen computer contained patient names, addresses, dates of birth, phone numbers and more.
The new version is being distributed as the image-editing program PixelMator.
Hackers may have accessed 176,567 current and former students' and employees' Social Security numbers, names, e-mail addresses and more.
Developers have managed to port the voice control solution to other iPhones.
The vulnerability can cause the open source DNS software to crash unexpectedly.
Violent images and porn were posted on several users' profile pages.
Robert Butyka is accused of causing $500,000 worth of damage.
Juniper Networks says the volume of Android malware has increased by 472 percent since July.
Among seven apps tested, even the top-rated app only detected 32 percent of malware.
Seeking to help organizations control the lifecycle of their sensitive data, RSA introduces enhancements to DLP Suite 9.0 that helps them address smartphones, tablets and social media.
The hackers say the company is leaking sodium sulfate into a local lake, polluting the air and turning snow black.
Global Title Services is suing its bank over more than $200,000 in losses.
More than 60 current and former students' grades were changed.
St. John Ambulance dispatchers were unable to access mobile data and paging services, and were forced to use manual backup systems.
Version 10.5.1 fixes a vulnerability that could enable man-in-the-middle attacks.
Panda Security says its CI engine now detects 73,000 new malware strains a day.
Version 15.0.874.120 fixes five 'high-risk' vulnerabilities, as well as several others.
A fake message was posted claiming that James Murdoch had been arrested by London police.
Four of the organization's main Web sites were taken down following denial of service attacks.
The malware uses a code-signing certificate stolen from the Agricultural Research and Development Institute of Malaysia.
The facial recognition feature can be tricked by showing it a photo of the owner's face.
The hacker posted 2,000 of Mayor Francis Slay's e-mails online.
Several memory corruption vulnerabilities, the company says, could lead to code execution.
The update fixes several security vulnerabilities, according to Canonical.
EDF has been fined €1.5 million, and two executives have been jailed.
User names, hashed and salted passwords, game purchases, e-mail addresses, billing addresses and encrypted credit card numbers may have been accessed.
While Floyd Landis received a 12-month suspended sentence, hacker Alain Quiros will spend six months in jail.
The NextGen Cyber Innovation and Technology Center is expected to open in March 2012.
The company says the updates provide 'improved compatibility, security and reliability.'
Patrick Ricciardi faces up to 15 years in prison and a $750,000 fine.
Dropbox version 1.2.48 patches a serious security flaw in the company's client software.
The update patches a vulnerability recently uncovered by researcher Charlie Miller.
Three of the vulnerabilities are rated critical.
Still, most spend less than 3 percent of their IT budgets on information security.
Management Suite 9 and Security Suite 9 are designed to support a broad range of platforms.
Forum users' e-mail addresses may have been accessed.
The service offers to extract sensitive information for $10 a call.
The group is accused of infecting more than four million machines with malware.
Victims are asked for their credit card info and e-mail address in order to 'receive further instructions.'
The patches affect versions 220.127.116.119 and earlier.
Vulnerabilities in federal prison control systems could allow hackers to open prison doors and crash CCTV or prison intercom systems.
Dr. Regina Dugan, DARPA's director, has called on 'visionary hackers, academics, and professionals ... to change the dynamic of cyber defense.'
A lost USB drive could put the 'privacy and financial record of millions of shareholders' at risk, according to the company.
Charlie Miller got a fake app approved that could be used to control an iPhone or iPad, or to steal data from it.
Barrett Brown's book will reportedly be called 'Anonymous: Tales From Inside The Accidental Cyberwar.'
Police have already made at least one arrest in connection with the attack.
The tool is designed to detect all malicious drivers used by the new malware.
In response, members of Anonymous have retracted a threat to identify associates of the drug cartel.
The president's Web site was taken offline after receiving 30 million hits on Saturday.
The company says the attack was detected on November 3rd.
Social security numbers, home addresses, phone numbers and e-mail address were published online.
An unencrypted memory stick containing personal information on more than 18,000 people was lost.
Attachmate's terminal emulation family, Reflection 2011 R2, gets upgrades to make users' sessions more secure.
The TrueType font parsing engine is to blame but Microsoft views the risk as low ... for now.
Fortinet researchers have uncovered several new variants of the malware.
The fan site for the French second division rugby club was unavailable for two weeks, but the German stock exchange was unaffected.
The Dutch certificate authority says it's stopped issuing certificates as a precautionary measure.
Security experts from the US and 27 European Union member states participated.
Srblche's site has been used to advertise data stolen from the U.S. Army, the U.S. Department of Defense, and other institutions.
Christopher Chaney has apologized for his actions, but faces up to 121 years in prison.
Files belonging to Major-General John Cantwell were likely stolen during transit through Kuwait.
Luke Angus McLaren faces charges of theft and unauthorized modification of data.
The campaign, which started in June, has resulted in more than 100,000 compromised Web sites so far.
The researchers found that 13 out of 15 CAPTCHA methods from leading Web sites were vulnerable to automated attacks.
Vlad Duiculescu was given a three-year suspended sentence by a Romanian court.
The Secunia Vulnerability Coordination Reward Program promises merchandise and access to a security conference.
Some of the vulnerabilities are rated highly critical.
GCHQ director Iain Lobban says major IT systems throughout the UK are facing increasing numbers of attacks.
Palestinian Communications Minister Mashur Abu Daqqa said the attacks appeared to be state-sponsored.
Local news reports are unclear, but some systems were left out of action for three days.
Yevhen Kullibaba and Yurly Konovolenko have been sentenced to four years and eight months in jail.
Josh Holly received three years' probation at a recent sentencing hearing.
The legitimate-looking e-mails ask victims to provide their ID and password.
Documents containing clients' names, addresses, birth dates and health card numbers were recently found in a dumpster.
Dillon Beresford says the vulnerability could be used to take control of systems running the software.
A vulnerability in the TimThumb image resizing utility for WordPress sites has had an enormous impact.
Simon Van Neste used forged ID cards to access secure areas of the Whitman College campus.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?