- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
Version 3.6.3 patches a flaw that could be exploited to cause a denial of service.
Three juniors at Palos Verdes High School are accused of hacking into their school's grading system.
The DMARC framework is intended to protect e-mail at the domain level.
The Midlothian Council has been fined £140,000 for five separate data breaches.
Razvan Manole Cernaianu, allegedly known as 'TinKode,' is accused of stealing data from NASA and Pentagon servers.
More than a hundred sites have been compromised, according to Websense.
Users are advised to deactivate telnet services in order to mitigate the vulnerability.
The malware is disguised as a plug-in for Google+ Hangouts.
The solution combines local software with a cloud-based service.
Andrey Sabelnikov has posted a statement online saying he has no connection to Kelihos or spam.
Researchers at Trend Micro have found malicious HTML designed to exploit the flaw.
Visiongain anticipates an increase in public-private partnerships across several cyber security sectors.
Large data sets offer new ways to track malware across a network.
In the wake of a threat by Anonymous to expose Symantec source code, the company advises customers to stop using pcAnywhere -- but says its antivirus software products are not at risk.
Members of 'IDF Team' launched the attack in retaliation for an assault on Israeli sites on Wednesday.
The site was taken down yesterday by a distributed denial of service attack.
The three men are accused of involvement in a cyber attack on the French energy firm.
As part of the agreement, the university will provide victims with two years of credit and fraud protection services.
Version 2.0 adds control over app permissions, as well as call and text messaging filters.
The malware was found in 13 different apps on the Android Market.
Targets included the Ha'aretz newspaper and the Sheba Medical Center.
Under the new rules, fines can be as much as two percent of a company's global annual turnover.
The update addresses a high severity XSS vulnerability, as well as a low severity issue.
Because the flaws are in an installation script, WordPress claims there's very little risk of their being exploited.
Users will not be able to opt out of the new policy.
For the past two weeks, the carrier provided its users' phone numbers to every Web site they visited.
Texas resident Theresa Stevens has filed a class action lawsuit claiming the company failed to protect customers' personal information.
Version 2.5.0 fixes two medium priority XSS vulnerabilities and two low priority information disclosure flaws.
The 'Malwr' tool is a front end for the Cuckoo malware analysis sandbox.
The government has confirmed that several servers came under attack last night.
An unidentified railroad 'was slowed for a short while' in December of last year.
Almost two million customers' personal information was exposed.
The attacks were launched to protest Poland's plan to support the Anti-Counterfeiting Trade Agreement.
The technology behind FireAMP came from Sourcefire's acquisition of Immunet in January of 2011.
The update patches four 'high severity' vulnerabilities.
The hackers say they accessed passwords, bank account information and online dating details.
The acquisition follows Twitter's purchase of Whisper Systems in November of last year.
The company says Andrey Sabelnikov was running the botnet.
The dual-core A5 chip presented a particular challenge to the hackers.
The flaws range from privilege escalation bugs to denial of service vulnerabilities.
The HP-sponsored hacking challenge revises its rules in an effort to expose even more vulnerabilities.
Don Jackson says Gameover is a 'private version' of Zeus.
The researchers were able to listen in on meetings and control a camera remotely to read information on documents.
The Web host says customers' billing and personal information were not exposed.
Following the attack, nothing remained of the official Web site for CBS except an index page with a single file.
Hundreds of people with seattle.gov e-mail addresses recently received phishing e-mails.
Versions 0.9.8t and 1.0.0g patch a vulnerability that was introduced with the release of a previous security update on January 6.
A hacker has discovered a way to access members' profiles.
The device uses an optical sensor to read transaction details from the user's screen, then generate an electronic signature.
A recent update to the VPN client added a malware site guard.
The hackers took down Web sites belonging to the FBI, DoJ, MPAA and others.
Yash K.S. has published a video demonstrating a man-in-the-browser attack capable of manipulating HSBC Bank transactions in real time.
The bank's Web site was taken down by a group calling itself 'IDF Team.'
The hacker claims to have login info for more than 30 million users.
Microsoft says the problem is not considered a vulnerability.
The botnet's command and control server was taken offline, according to a Facebook official.
Robert Butyka received a three-year suspended sentence, with a probation period of seven years.
The research firm has reduced its deadline from one year to six months.
All five are Russians living in St. Petersburg.
The new program at City University London is intended to help security professionals bridge the gap between security and business.
The hackers say the attack was in retaliation for recent cyber attacks on Israel's Tel Aviv Stock Exchange, El Al Airlines and other sites.
Vladimir and Kirill Zdorovenin are accused of stealing hundreds of thousands of dollars through credit card theft and stock manipulation scams.
The first Critical Patch Update of 2012 tackles a long list of issues, but only two patches apply to Oracle's namesake database.
A new version of the Carberp Trojan demands login information and $25 to unlock the victim's Facebook account.
The company found 58 new Mac threats between April and December of 2011.
Kaspersky Lab says courses are available in hacking, defacing, spamming and more.
The company had initially blamed a third party for the security breach.
SE Android is designed to improve upon Android's application security model.
Cybercriminals transferred money from other customers' accounts into their own in early January.
The problem was reported by McAfee customers, who found that their IP addresses were being blacklisted for sending spam.
At least seven viruses were recently detected that had been in place since 1999.
The company has also introduced several enhancements to the FortiWeb 4.0 MR3 operating system.
The company says no financial information was compromised.
The Web sites were shut down, but trading and flights were unaffected.
Names, e-mail addresses, phone numbers and password hashes were exposed.
Staff and administrator names, e-mail addresses, phone numbers and passwords were leaked.
The center, based in The Hague, is intended to coordinate information and expertise between government agencies.
The World Economic Forum says cyber attacks are among the most likely global risks to occur over the next decade.
Twenty-seven of the vulnerabilities are in the MySQL database.
The messages contain a link to an external phishing page that asks for the victim's name, e-mail, password and more.
A new version of the malware is designed to steal smart card credentials from users at the U.S. Department of Defense and other organizations.
Information about the space agency's unmanned H-2 Transfer Vehicle may have been compromised.
Customer data was transmitted unencrypted.
Version 5.3.9 patches two security flaws.
Social security numbers and federal ID numbers were posted online.
Intrepidus Group researchers recently discovered a way to listen in on the connection between the PlayBook and a BlackBerry smartphone.
Company CEO George Friedman attributed the oversight to the company's rapid growth.
The plan is for banks to share information with the center, which will then analyze the data to look for suspicious activity.
The DOE recently unveiled the Electric Sector Cybersecurity Risk Management Maturity project.
Versions 1.4.11 and 1.6.5 of the open source network protocol analyzer were recently released.
The malware is being distributed in zip files attached to fake FDIC e-mails.
According to Websense researchers, the method offers the 'ultimate URL obfuscator.'
Android.Qicsomos is a modified version of an open source solution designed to detect Carrier IQ on a mobile device.
A list of addresses and logins for several systems was posted today on Pastebin.
The hackers are threatening to publish thousand of Saudi shoppers' credit card numbers.
Cisero's was forced to pay fines for a possible security breach that was never actually confirmed.
A friend of the girl's discovered that her father had planted a Trojan on her computer.
In the first Patch Tuesday of 2012, Microsoft fixes an old issue and warns about a new security bypass risk.
The Web sites for two Finnish anti-piracy organizations were taken down by DDoS attacks.
Livia Antonieta Acosta Noguera was given 72 hours to leave the country.
The malware poses as betas of Defense of the Ancients 2 and Diablo III.
The company has released a security update to patch the vulnerabilities.
A link leads to a site that advises the user to install an add-on called ClickPotato.
Members of Anonymous Belgium leaked information on ArcelorMittal.com's users and administrators.
Dario Carluccio and Stephan Brinkhaus were able to change a meter's consumption information to -106610 kWh.
The new Zeus variant steals the victim's banking information, then launches a DDoS attack.
New release gains support for MySQL, helps shield enterprise databases from attack.
The country's deputy foreign minister said cyber attacks are 'a breach of sovereignty comparable to a terrorist operation.'
The site had already been taken down by another DDoS attack earlier this week.
Members of the hacker group Team Intra accessed staff user names, domain information, and hashed passwords.
The updates will patch flaws in Windows and in the company's developer tools software.
Versions 0.9.8s and 1.0.0f were recently released.
The company says the compromised code was more than four years old.
Hacker TyHi successfully deployed the Kindle Fire's Silk browser on a different Android device.
The SQL injection attack was first identified and disclosed in early December.
Version 220.127.116.11 of the open source web application framework was recently released.
The company says 'multiple high risk security vulnerabilities' could allow an attacker to execute arbitrary code.
Randy Chaviano got a retrial after a virus deleted transcripts from the court stenographer's computer.
The malware has already stolen more than 45,000 users' login credentials.
The latest version of the chat client logs all user conversations by default.
More than a thousand patients' private medical records were accessed.
Malware creators have begun poisoning Google search results for popular mobile applications.
The new release fixes a cross-site scripting vulnerability.
Ade Barkah discovered that an incorrect time setting can enable photos to be viewed on a locked device.
Nazi-Leaks.net lists the names and addresses of thousands of supporters of far-right groups.
The denial of service attack was confirmed via Pastebin's official Twitter account.
According to a member of Group-X, the data accessed included names, addresses, phone numbers, Social Security numbers, and credit card details.
Almost 15 percent of all spam in the third quarter of 2011 was sent from India.
The Corona jailbreak tool was developed by researcher pod2g.
Gordon Brown may have been targeted when he was Chancellor of the Exchequer.
Staff e-mails and customer billing information were posted online.
Many home Wi-Fi networks are at risk thanks to an exploit released over the holidays, but enterprise organizations are generally unaffected by the vulnerability.
The virus has already been tested in a closed network environment.
The malware sends the phone model and number, Android version, and IMEI number to a remote server.
The center will focus on monitoring and responding to cybercrime in the country.
If the recipient clicks on a link in the message, they're taken to a Web site serving Windows malware.
The site's approximately 18 million users were recently notified that their passwords were being reset.
The 'Hackerspace Global Grid' will include satellites in orbit, along with ground stations to track and communicate with them.
Customer data, including contact information and dates of birth, was posted to Editgrid.com.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?