- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
Affected game titles include 'Assassin's Creed: Revelatons' and 'Tom Clancy's Splinter Cell: Conviction.'
The company calls the new device a 'next-generation intrusion prevention appliance.'
Eduard Arakelyan and Arman Vardanyan were both sentenced to five years in prison and ordered to pay $42,000 in restitution.
One of the accounts on The Daily Caller's ad server was hacked, according to spokesperson Nicole Roeberg.
Felix Lindner described the routers' security as 'the worst ever.'
The company also says a third of Android apps are compromised with malware.
The e-mails include an attachment containing a Windows Trojan.
KT customers' names, phone numbers, and resident registration numbers were stolen.
AAPT customers include the Australian Federal Police, Energy Australia, and the Swiss embassy, among others.
The funding round was led by new investor Sequoia Capital.
The hackers stole 40 GB of data to protest a proposed data retention law.
Thousands of spammed tweets are intended to distribute malware.
The site has been unavailable for more than two days.
Junaid Hussain, a.k.a. 'TriCk,' pleaded guilty earlier this month.
Security and civil liberties are not mutually exclusive, argues the Director of the NSA and the US Cyber Command.
AuthenTec will become a wholly owned subsidiary of Apple, according to an SEC filing.
The updated version watches for specific keywords, including 'USA' and 'gov.'
The new version of Opfake delivers a working copy of Android Mini.
'Any attacker can pretend to be an aircraft,' researcher Andrei Costin says.
How do you provide military-grade secure wireless network connectivity to 6,000 hackers? We take a look inside the Network Operations Center at the Black Hat 2012 conference.
The gang is accused of attacks on 185 government Web sites.
Apple takes the stage at the hacker conference to demonstrate how security has been baked into iOS devices, from the hardware on up.
Millions of hotel rooms may be vulnerable.
The malware was found in the application package for the 'Instaquotes Quotes Cards for Instagram' app.
Ten government Web sites were defaced in protest of planned changes to privacy laws.
Two advisories 'address vulnerabilities first discovered in 2010,' according to the company.
The malware has not yet been found in the wild.
The scam, customized for the victim's location, is designed to steal credit card data.
Near Field Communication vulnerability on Android phones demonstrated at the Black Hat 2012 conference.
The police say they've been surprised by the scope of the attack.
The $1,295 device is disguised as a surge protector.
The app scans Android devices for unpatched vulnerabilities.
After 10 years on Apache, the popular open source ModSecurity web application firewall is expanding its footprint to Microsoft's IIS web server.
A stolen laptop contained approximately 3,900 patient records and 230 administrative employee records.
A new worm apparently caused AC/DC's 'Thunderstruck' to blast from workstations at Iranian nuclear facilities.
PwnedList founder Steve Thomas calls it 'the largest leak I've ever actually seen.'
The company says it has been temporarily locking accounts when it detects suspicious activity.
The new unit will 'hold accountable those who misuse technology to invade the privacy of others,' according to Attorney General Kamala Harris.
Catherine Venusto faces up to 42 years in prison.
123 ministry computers were infected with data-stealing Trojans.
The Termineter framework is designed to help utility companies look for security flaws.
And according to Bitdefender, 42.5 percent of iOS apps don't encrypt that data, even when sending it over public Wi-Fi.
56,859 phishing Web sites were detected in February.
E-mail addresses, first and last names, and company and institution names were accessed.
With new features for enterprise mobile app developers, Oracle Identity Management 11g Release 2 enables the extension of authenticated access beyond the four walls of the organization.
Dmitry Olegovich Zubakha faces up to 37 years in prison.
Bryce Kingsley Quilley hacked into his former employer's server -- and threatened the owner with an axe.
Aleksander Suvorov has also been ordered to pay a fine of $300,000 and $675,000 in restitution.
A former college basketball player accessed 12 elite clients' accounts and used them to place orders online.
Data published online included e-mail addresses, user names, names, addresses, phone numbers and more.
The botnet was responsible for 18 percent of all spam worldwide.
Version 4.1 is the first to fully implement ASLR.
The vulnerability provided attackers with access to user accounts.
The company has brought in outside experts to investigate a flood of spam.
The vulnerability could provide an attacker with access to a victim's Amazon account.
As many as 2.4 million voters' names, genders, birthdates and addresses were exposed.
Security issues in database, middleware, and CRM applications are addressed in Oracle's quarterly CPU.
The spyware can log keystrokes, capture screenshots, steal messages and record audio.
Virtuata provides software for securing virtual machines.
The flawed update was made available for more than eight hours on July 11.
Some users' chat messages are being sent to unintended recipients.
Safe browsing tip: Don't download browser extensions and add-ons from third-party websites.
Joshuah Allen Witt was one of a trio of hackers who stole more than $3 million from 50 different companies.
The company says it has fixed the vulnerability and deployed additional security measures.
The e-mails direct recipients to a fake account login page.
The hackers attacked Exxon Mobil, Shell, BP, Gazprom and Rosneft.
The company has fixed 10 different vulnerabilities in its TelePresence products.
Researchers say the vulnerabilities could give an attacker full control of a terminal.
Madeline Vinton allegedly stole $220,000 in company funds, including $48,000 in false overtime claims.
More than 20,000 plain text passwords were published online.
Many ISPs cushioned the fall by re-routing infected users after the July 9th deadline.
The hack doesn't require any jailbreaking of the device.
E-mail addresses, user names and hashed passwords may have been accessed.
Guerilla Black is accused of stealing at least $150,000 using the credit card data.
Stolen credit card information was used to make purchases in three states and the Dominican Republic.
The vulnerabilities could enable an attacker to access user names and passwords.
The company will use the funding to open a U.S. office and to grow its sales and product development teams.
Over a million user names, e-mail addresses and hashed passwords may have been accessed.
Once again, a major Internet property has been found lacking in security -- though Yahoo claims that most of the breached passwords were invalid.
The flaw apparently enabled a security researcher to add himself to Mark Zuckerberg's account as a friend.
The malicious apps were downloaded more than 50,000 times.
Developer kornyone has posted detailed instructions on how to root the device.
The alleged scheme caused losses of more than $2.7 million.
The drives were infected with spyware designed to upload user names and passwords to a remote server.
Approximately 420,000 user passwords were posted online.
New management takes the reins at the Black Hat conference this year. Here's a look at what's changing and what to expect.
The malware enables the attackers to initiate transfers from victims' bank accounts.
The group has already posted information on hundreds of alleged pedophiles.
Microsoft fixes some -- but not all -- XML flaws in the July Patch Tuesday security update. Meanwhile, Internet Explorer is set to get more frequent patches.
A Java applet determines whether the victim's machine is running Windows, Mac or Linux, then downloads the appropriate malware for the platform.
The company says the user names and passwords were not taken 'from any Best Buy system.'
Sophos researchers identify the malicious attachments at Troj/Invo-Zip.
Damola Clement Olatunji and Amos Njoroge Mwangi were arrested in December of last year.
A DVD containing Stay Smart Online subscribers' user names, e-mail addresses and passwords was lost in the mail.
The funds will be used to expand AlienVault's sales, marketing and support functions, and to further invest in research and development.
Alan Watkins was the leader of a gang that stole more than 170 vehicles.
More than 100,000 devices have already been infected, according to the company.
Haaretz reports that there have already been attempts to exploit the published data.
Microsoft is set to release 9 patches next week, double what it issued in July of 2011.
The malware sends SMS messages to premium rate numbers.
12,680 students' personal information may have been accessed.
More than two million e-mails will be released over the next few months.
The ruling describes the bank's security systems as 'commercially unreasonable.'
Pavel Cyganok, Ilja Zakrevski and Aldis Krummins received five-year, four-year and two-year prison sentences, respectively.
The number of malicious apps recently doubled in the space of a single month.
Google denies that Android devices are the source of the spam.
The malicious app uploads the user's entire contact list to a remote server, then sends spam texts to all contacts.
Seven sirens in Lemont, Ill., and three in Evanston, Ill., recently began sounding despite the fact that no village officials had activated them.
@NeedADebitCard points out the idiocy of posting a photo of your debit or credit card online.
Yevhen Kulibaba and Yuriy Konovalenko are already in prison in the UK.
Osarhieme Uyi Obaygbona faces up to 50 years in prison.
The ministry's Web site was defaced, and images of foreign diplomats' identity cards were posted online.
Data from naval computer systems was uploaded to Chinese IP addresses.
The acquisition gives Ixia access to BreakingPoint's testing platform -- and BreakingPoint's customer base.
LogRhythm says the funding will be used to accelerate growth, product innovation and international expansion.
The attack was part of Anonymous' Operation Liberation, launched in August of 2011.
Christopher Chaney faces a possible 71-month prison sentence and payments of more than $150,000.
Junaid Hussain, a.k.a. TriCk, will be sentenced next month.
The malware connects to a command and control server in China.
An unsecured wireless network led an Indiana SWAT team to the wrong house.
An unencrypted laptop containing sensitive information on 30,000 patients was stolen from a doctor's home.
Several reports indicate that Facebook's apps for Android and iPhone may be replacing contacts' e-mail addresses with Facebook e-mail addresses.
University of Texas researchers demonstrated the attack using equipment that cost less than $1,000.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?