- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
The document focuses on two key integrity measurement mechanisms.
Members of Anonymous published data on almost a million people.
The hackers have announced plans to target Israeli Web sites in the coming year.
The company says botnets have accounted for almost 80 percent of the security blocks at Zscaler over the past month.
The flaw was discovered by security researchers Alexander Klink and Julian Waelde.
Professor Stefan Katzenbeisser says the vulnerabilities could be exploited to cause extensive service disruptions.
The company also says the same software development environment was used to build both viruses.
The researchers say the attack method is already being actively exploited.
The WPS attack tool was released this week by Tactical Network Solutions.
The update was released approximately two weeks before the company's regularly scheduled security update.
User names, passwords, e-mail addresses and other data were posted online.
The malicious software is detected by Kaspersky as Trojan-SMS.AndroidOS.Scavir.
The company says cyber criminals will target utility systems in the coming year.
The security think tank says Anonymous hackers weren't able to access its confidential client list.
The vulnerability in the Sielco Sistemi Winlog application could be exploited to execute arbitrary code.
Anonymous hackers claim to have stolen 14,000 passwords and 8,000 credit card numbers from the equipment retailer.
The unpatched flaw affects all versions of the Microsoft .NET Framework.
The tool, Spire, was introduced via a post on hacker chpwn's blog.
The update is designed to mitigate a vulnerability that was discovered by researchers in late November.
Filmmaker Darryl Manson purchased the drive from retailer Dick Smith, only to find that it contained both malware and pirated movies.
One of the flaws was being actively exploited in wild, according to FreeBSD security officer Colin Percival.
Valerie Boyer's site was defaced in retaliation for her authoring of a bill that criminalizes the public denial of the Armenian Genocide.
According to Intego researchers, the campaign tries to trick victims into disclosing their credit card information.
The vulnerability was discovered by researcher Stefan Viehbock, who reported it to US-CERT.
The company plans to release patches for the flaws in January.
Sites targeted included the president's Web site and the tourism bureau.
Version 3.4.9 patches vulnerabilities that could be exploited for XSS attacks.
A total of 8,745 debt advice records were accessed by hackers.
The class action lawsuit seeks $16 million, or $1,000 per patient.
Approximately 200 GB of sensitive information, including credit card data, was stolen.
The flaw can be exploited to crash the complete software process.
Key features include privacy reports, call and SMS filtering, SIM card change notifications, firewall and application management.
Trend Micro researchers report that the North Korean leader's death is being leveraged to distribute a Trojan.
Customer names, addresses, phone numbers, e-mail addresses, credit card and billing information may have been accessed.
Facebook has announced plans to make changes to its site for European users.
The malicious apps were disguised as free versions of popular games.
The funds for 2012 include $443 million for cyber security.
The update patches a vulnerability that could be exploited to compromise a victim's system.
The Trojan offers to decrypt three files in order to convince victims to pay $69.
All of the links in the e-mails redirect victims to a site hosting the BlackHole exploit kit.
The site serves a malicious Java applet that retrieves a Trojan.
The update to version 9.0 patches several vulnerabilities in Firefox.
Comodo Internet Security 5.9 supports the company's TrustConnect VPN service and adds a new 'quick scan' engine.
The independent audit identified three specific information security program weaknesses.
According to a new report, the shipping industry has 'low to non-existent' awareness of cyber security issues.
The research firm predicts that anti-virus software sales will increase 6.8 percent year-on-year.
According to the firm, the phishing e-mails contain an attachment that installs a banking Trojan on victims' PCs.
Hackers accessed six weeks of e-mail from four employees who focused on Asia.
The new feature, called Picture Password, supports a combination of gestures for authentication.
Both vulnerabilities are being actively exploited.
A malicious link was posted, along with the promise of free iPad 2s for all followers.
The ransomware imitates messages from local police, including the UK Metropolitan Police, the Spanish police, Dutch police, and many others.
Company president and CEO Peter George says APTs will grow in volume and sophistication.
Proof-of-concept code was recently published on Twitter.
According to the developer team, the vulnerability is already being exploited on a large scale.
The Royal Canadian Mounted Police is looking into a possible connection between a data breach and a series of arson attacks and shootings.
The hackers leaked personal information on Senators who had voted for the National Defense Authorization Act (NDAA).
Valeriu Gaichuk and two associates were arrested while trying to withdraw $1 million from CEC Bank.
The journalists are suspected of hacking into computers belonging to the Australian Labor Party.
The defendants are accused of stealing more than $2 million from several different financial institutions.
The new version addresses four denial of service flaws.
The company will roll out automatic upgrades of Internet Explorer starting next month.
Information on 1.8 million customers may have been accessed.
The Iranians say they leveraged a known vulnerability in the drone's GPS system to trick it into landing in the country.
The improvements are intended to make the solution more attractive for enterprise deployments.
Fully 70 percent of employees age 21-29 often ignore their companies' security policies, according to a Cisco-sponsored survey.
The vulnerabilities could lead to a cross-site scripting attack.
The majority of the malicious apps, the company says, can be found on third-party app stores.
Kevin George Poe faces charges of unauthorized impairment of a protected computer.
The company says no customer data was exposed, and its infrastructure and systems were not affected.
The malware disabled computer connectivity within Gwinnett Medical Center's two facilities.
Several European banks have already taken steps to limit potential fraud.
The Department of Homeland Security has re-released a warning from 2010 stating that industrial control systems can be detected by Internet scanners.
The refunds will average $20 per person.
The vulnerabilities were discovered by Secunia's Dmitriy Pletnev and independent researcher Hossein Lotfi.
The newest version of the browser addresses six high-risk, seven medium-risk, and two low-risk vulnerabilities.
The men were arrested following a joint investigation by the FBI and the Bulgarian Chief Directorate for Combating Organized Crime.
The unit, which began operations in August, has already filed charges in 20 cases.
Hackers accessed cardholder names, credit card numbers, expiration dates and CCVs.
Dr. Panayotis A. Yannakogeorgos says the Russians may have intentionally planted a worm with digital U.S. and Israeli fingerprints.
The study was financed by Google, though Accuvant says it was an 'independently designed security analysis.'
The hackers chose not to exploit the security flaw.
Some members' e-mail addresses and IP addresses were posted online.
Final Patch Tuesday release of 2011 tackles 13 bulletins, three rated as critical.
The vulnerability has been tested and confirmed on several Windows Phone devices.
Personal information on more than a million customers was inadvertently made available online.
Miller recently gave a talk at NATO's Cooperative Cyber Defense Center of Excellence in Tallinn.
According to Veracode, 40 percent of Android apps contain at least one instance of hard-coded cryptographic keys.
Judge Lee Rosenthal ruled that the banks had failed to state proper claims for seeking damages from the company.
Google recently removed 22 malicious apps from the market.
The scammers stole between £1,000 and £5,000 at a time from hundreds of British students.
The Web site dawn.com was defaced, and some database information was published online.
Version 5.1.3 patches a highly critical vulnerability.
All cloud service providers will have to meet the standards in order to sell their products and services to government agencies.
The two security flaws were uncovered by Russian research firm Intevydis.
The company will release 14 patches to fix 20 vulnerabilities.
The group has claimed responsibility for the shutdown of a PR firm that represented Monsanto.
The names of approximately 4,700 residents who owed money to Contra Costa County's Health Service Department were posted online.
The class action lawsuit follows recently published research which uncovered a significant vulnerability in HP printers.
It's a big change from Veracode's last set of tests six months ago, in which 42 percent of applications passed.
The company says the attackers were able to access some private data and documents.
The Telegraph is reporting that FBI officials have 'substantial evidence' that attempts were made to hack key e-mail accounts.
The four Romanian residents have been charged with conspiracy to commit computer fraud, wire fraud and access device fraud.
Five members of Congress have sent a letter to TRICARE Management Authority asking for more information on the breach.
Key enhancements in Endpoint 10 include patch management, Web filtering and full-disk encryption.
More than 50 businesses' Web sites were redirected to the Occupy Toronto site.
According to Sophos, 33 of 50 lost USB devices it examined were infected.
The company says the bug was created in a 'recent code push' and was only available for a limited period of time.
The spammers were accused of sending out fake e-mails telling recipients they had won a lottery sponsored by Yahoo.
Companies could face fines of up to five percent of their global turnover.
The vulnerabilities are fixed in version 11.60.
The company says global spam has fallen to its lowest level in three years.
The new services offering is intended to help organizations assess and mitigate the risk associated with deployment and use of mobile devices.
Customers' names, screen names, birth dates, e-mail addresses, phone numbers and mailing and IP addresses were posted online.
Customers' credit card numbers were accessed.
The company says it plans to have a patch available by next week.
The current system, researchers say, leaves six million miles of electrical lines unprotected.
Next Generation Firewall market moves forward with new release.
According to a recent study, data breaches in the healthcare industry have increased by more than 30 percent.
Several Web sites were taken down by DDoS attacks that may have been coordinated by the Russian government.
The purchase is Raytheon's ninth cyber security related acquisition since 2007.
E-mails claiming to come from Amazon.com ask for the user's credit card details, date of birth and more.
According to Trend Micro, the password reset function makes it disturbingly easy for a hacker to access a user's account.
Google's Safe Browsing Alerts will now alert network operators to domains that are responsible for distributing malware.
Hacker Kahuna published over 2,000 titles, names, addresses, e-mail addresses, phone numbers, and more.
A user's location and identity can be exposed, along with any content being downloaded.
Members of Sector 404 leaked Barack Obama's e-mail address, username, password, personal phone number and login ID.
The flaw can allow an attacker to change users' status messages.
The lawsuits claim the company's software violates mobile phone users' privacy.
Kaspersky Labs researchers say all of the command and control servers were wiped clean on October 20.
The number of cases of fraud costing more than $100,000 is also on the rise.
The e-mails ask Apple customers to click on a link to update their billing information.
The vulnerability can enable attackers to record conversations and monitor location data.
A group of researchers claims to have jailbroken the device.
The company has released an update to patch a flaw that could enable cross-site scripting attacks.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?