- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
Names, addresses, Social Security numbers and bank account numbers were published online.
A simple process can reveal any Skype user's remote and local IP addresses.
The breach occurred in December 2010, but was only recently uncovered by the company.
Pornographic Web sites are less likely to be infected than religious, automotive or health sites, according to the company.
The hackers defaced the site's main page with a statement alleging that admin passwords were stored in plain text.
The company says the new version improves both scanning performance and malware detection rates.
The House of Representatives passes the controversial cybersecurity legislation, but opponents vow to stop it in the name of online privacy.
Only 19,024 of 200,000 sites studied are 'genuinely secure,' according to the research results.
The Rugged Operating System (ROS) comes with a static username and an easily identifiable password.
Hackers have been offering to exploit the bug for as little as $20 per account.
The forum was shut down after a hacker demonstrated the ability to access e-mail addresses and passwords.
The hackers redirected visitors to a page supportive of the country's president.
Eugene Kaspersky says Apple has a lot of catching up to do.
The code for VMware ESX dates from the 2003 to 2004 timeframe, according to the company.
In response to the findings, the ICO has published guidelines to help people delete all data from used hard drives.
Luigi Auriemma says he came across the issue by accident while trying to play a practical joke on his brother.
A vulnerability could give attackers access to other users' data.
The center is aimed at helping the industry identify and remediate cyber attacks and threats.
Six-month trials of five different security solutions are available in the company's Anti-Virus Marketplace.
According to Sophos, 20 percent of Macs are infected with Windows malware, while 2.7 percent are infected with Mac malware.
Russian-speaking cybercriminals doubled their annual income from 2010 to 2011, according to Group-IB.
Big Blue embraces the open-source IPS signature system.
The new version, Flashback.S, doesn't request an administrative password prior to installation.
All entrants' home and e-mail addresses were published online.
The companies will work together on research and development, and will make Lookout's security app available to Deutsche Telekom's customers.
The maximum bounty has been increased to $20,000.00.
The company says user IDs and hashed passwords were stolen.
Vulnerabilities were patched both in the platform itself and in three external libraries.
The proof-of-concept malware uses the device's motion sensors to steal passwords and other user data.
The country was responsible for 9.3 percent of all spam between January and March of this year.
Sixty-one percent of survey respondents expect to be attacked by Anonymous within the next six months.
The Iranian government has acknowledged that some data was stolen.
Matt Weaver is accused of stealing approximately 700 students' user IDs and passwords in order to affect the results of an election for student body president.
Almost half of the attacks came from North America, according to BBC News.
The MedMon device is intended to protect wireless medical devices from cyber attacks.
The action was taken to protest ongoing human rights abuses in the country.
Christopher Lykes is accused of stealing 228,435 people's personal data, including names, phone numbers, dates of birth and Medicaid account numbers.
According to Kaspersky researchers, hundreds of compromised accounts are currently spamming as many as eight messages per second.
The sites appeared to be redirecting visitors to malicious Web sites.
Ten misplaced backup discs contained personal data on approximately 315,000 patients.
The AnonPaste service is based on the open source ZeroBin software.
Petr Murmylyuk is accused of causing $1 million in losses to brokerage firms, and stealing the identities of more than 300 people.
The security firm says the number of infected computers is now down to 140,000.
The Trojan is being sold on underground forums for $280.
The malicious apps are being offered on Web sites that mimic the official Instagram site.
The first exercises were held in Beijing last June, and in Washington last December.
The 15-year-old was caught when his anonymizing software failed.
The operating system scored well for its security, authentication, device wipe functionality, firewall and virtualization.
Personal information on almost 4,000 former students was mistakenly attached to an e-mail.
Higino O. Ochoa III posted a photo without purging the metadata -- which included the GPS location where the pic was taken.
The new variant stops the operating system from loading until a ransom is paid.
John Anthony Borell III faces up to 10 years in prison and a fine of $250,000.
Software engineer Jared Wein says the aim is to improve security, reduce memory usage, and open up the Web.
A recent study found that 27 percent of respondents reported at least one security breach in the past 12 months.
McAfee says the malware has already been downloaded by at least 70,000 users.
The Trojan doesn't require any user interaction to infect a victim's machine.
James Jeffery accessed the names, e-mail addresses and phone numbers of approximately 10,000 women.
Intelligence sources say the virus was planted at the Natanz nuclear facility using a memory stick.
The two teenagers were arrested by members of the UK's Police Central e-Crime Unit.
More than 80 percent of enterprise software applications built in-house use open source components that may contain vulnerabilities.
The company says it's nearing the end of the development cycle and plans to launch the phone in late 2012.
The latest Mac OS X Lion update also disables the automatic execution of Java applets.
Some users are being required to select and answer three security questions before purchasing apps.
The updates patch a vulnerability that could be exploited to execute arbitrary code.
The Trojan connects to a remote Web site to download and install additional malware on the victim's device.
The company says HP 5400 zl series switches purchased after April 30, 2011 may be affected.
The updates patch four vulnerabilities that could lead to arbitrary code execution.
Prolexic says it mitigated more attack traffic in the first quarter of 2012 than it did in all of 2011.
Researcher Paul Brodeur created a proof of concept app that was able to access system information, along with data on the device's SD card.
The company hasn't yet said when it expects the tool to be made available.
Brian Krebs reports that hackers are charging between $300 and $3,000 to modify a meter.
The malware is designed to steal Ceridian users' IDs, passwords, company numbers and image-based authentication icons.
The state's Department of Technology Services says it will send letters to every person affected.
The attacks were launched in protest of the organizations' support for CISPA.
April's Patch Tuesday update delivers six bulletins -- including a critical fix for a core flaw that affects a long list of Microsoft applications.
Two free tools are now available that make it easy to check for infection.
The group says the attack was launched in support of human rights and freedom of expression in Tunisia.
The aim is to bring 20 women into Hacker School's 2012 summer session.
The group is threatening to launch similar attacks every Saturday.
Latest browser update includes a Flash fix that no other platform will receive.
Cody Kretsinger faces up to 15 years in prison.
Names, e-mail addresses, business addresses, contact information and hashed passwords may have been accessed.
'Hardcore Charlie' has published data on Pastebin and Photobucket.
The malware can record phone calls, change network settings, upload the current GPS location, reboot the phone, and more.
The vulnerability was discovered by UK app developer Gareth Wright.
Five key online forums were taken down two weeks ago by an apparent DDoS attack.
Names, addresses and Social Security numbers may have been accessed.
The majority of the infected computers are located in the U.S. and Canada, according to Doctor Web.
The new version of the LeNa malware doesn't require any user interaction to gain root access.
The free service includes daily recurring scans of any three pages of a domain.
Hacker Higinio Ochoa says eight FBI agents stormed his apartment on March 20.
A recent update patched 12 vulnerabilities, including one that was being actively exploited.
The guide is aimed at improving the public sector's understanding of cloud security.
The new configuration tries to trick victims into disclosing their credit card information.
The Adobe Malware Classifier is available for download from SourceForge.
The e-mails are disguised as airline check-in notifications.
The company has already found more than 100 files infected by DKFBootKit.
Edward Pearson has been sentenced to 26 months in jail.
Cleary violated his bail conditions by contacting FBI informant Sabu online.
The site currently gets more than 1,200 abuse reports a day.
The sites were defaced with a warning to the government and messages of encouragement to the Chinese people.
Twitter says the vulnerability was not exploited maliciously.
Visa drops credit card processor Global Payments Inc. from registry of secure providers as details emerge about theft of 1.5 million card records.
User names and password hashes were published online.
An attached ZIP file infects the recipient's PC with malware identified as Mal/BredoZp-B.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?