SANS Database 6

SANS Database - Úvod  1  2  3  4  5  6  7  8

Poslední aktualizace v 06.07.2017 15:52:02

 

Researcher creates proof-of-concept malware that infects BIOS, network cards
Researcher releases exploit code that can allegedly crash pcAnywhere
Researcher to demonstrate feature-rich malware that works as a browser extension
Researcher: 200,000 Windows PCs vulnerable to pcAnywhere hijacking
Researchers Build Objects With 3D Printing Using Simulated Moon Rocks
Researchers Create Short-term Memories In Rat Brains
Researchers Create Vomiting Robot To Analyze Contagions
Researchers Demonstrate 3D Spy Trojan for Mobile Phones
Researchers Devise New Attack Techniques Against SSL
Researchers Lift Lid on Government-Distributed Cyber-Spy Trojans
Researchers Mine Old News To Predict Future Events
Researchers Use Lasers For Cooling
Researchers warn of cyber flaws in Honeywell control systems
Researching Information Security Issues 
Resistance against US cyber security act is growing
Resolution(s) For The New Year 
Resolving erratic behavior of an Oversized PST using advanced PST File Splitter tool
Resources: Windows Auditing & Monitoring, Linux 2FA
Results vs. Relationships - Finding Your Balance on the Seesaw
Reuters staffer accused of aiding hackers maintains innocence -lawyer
Reuters staffer accused of aiding hackers maintains innocence: lawyer
Reuters suffers double hack
Reuters suffers second hack this month
Revealed: Chrome Really Was Exploited At Pwnium 2013
Reverse Cross-Site Request (RCSR) vulnerability 
Review: Google Compute Engine
RFC 6598 - Carrier Grade NAT
RFC2142 is a two-way street 
RFP criteria for how to build an agile data infrastructure
Rhombus Tech A10 EOMA-68 CPU Card Schematics Completed
RIAA says Google piracy policies are lacking
Rick Kelly: Value focus
Rig Exploit Kit from the Afraidgate Campaign
Richard III Suffered an Ignominious Burial, Researchers Find
Risk... in the most obscure places
Risks of boomerangs a reality in world of cyberwar
Risks on the Rise: Making a Case for IT Disaster Recovery
Riverbed, 6connect, Ixia Unveil New Products, Services at Interop
Robot Learning To Recognize Itself In Mirror
Robot Serves Up 360 Hamburgers Per Hour
Robot Snake Could Aid Search and Rescue Operations
Robot Snakes To Fight Cancer Via Natural Orifice Surgery
Robotic Bartender Assembles Your Drink, Monitors Alcohol Consumption
RockBox + Refurbished MP3 Players = Crowdsourced Audio Capture
Rocket boffinry in pictures: Gulp the Devil's venom and light a match
Rogue US Airways-themed emails distribute ZeuS-based malware
Romanian authorities dismantle hacker group targeting government websites
Romney Campaign Accidentally Launches Transition Web Site
Rootkit Findings 
Rootkit infects Linux web servers
Root-Level Exploit for OSX LaunchD Service 
Rough Roving: Curiosity's Wheels Show Damage
Rover Finds Ancient Streambed On Martian Surface
Rover Fuel Came From Russian Nuke Factory, But Supplies Running Low
Royal Canadian Air Force Sees More Sims In the Future of Fighter Pilot Training
RPC DCOM Update 
RPC DCOM Update: sdbot variant 
RPC DCOM WORM (MSBLASTER) 
RSA Conference 2012 sneak peek: cloud, big data, and mobile
RSA Conference 2012: Former NSA director says secure clouds can't come fast enough
RSA Conference 2012: Stress and burnout in infosec careers
RSA teams to bolster security for Apple, Google, RIM devices
rtfdump
RuggedCom fails key management 101 on Rugged Operating System (ROS), (Tue, Aug 21st)
Rumors about IIS 6.0 issues 
Running InfoSphere Software in a Virtual Environment without ILMT May Cost you Millions
Russian botnet operators infected 6 million computers
Russian Cyber Criminal Unmasked As Creator of "Most Successful" Apple Malware
Russian EBookseller LitRes Gets Competing EBook Apps Booted From Google Play
Russian charged with hacking into brokerage accounts
Russian malware spies on US ATMs
Russian start-up claims BitTorrent-killer
Russian Univ. Launches Course Based On ReactOS Led By Alex Bragin
Russian upstart claims BitTorrent-killer
Russia's Former KGB Invests In Political Propaganda Spambots
Russia-speaking cybercriminals earned $4.5 billion in 2011, researchers estimate
s_ta_ts.js, anyone? 
Sacre Bleu! US fingered for Flame attack on Élysée Palace
Safari 5.1.7 - an interesting feature, (Thu, May 10th)
Safemode rootkit & DRM 
Safer Online Shopping Guide 
Samba - Buffer Overrun, HP Remote Command Execution, Top 15 Worms, Hosts File, Sasser/Dabber Activity
Samba security patch fixes critical remote code execution hole
Samba vulnerability, Veritas BackupExec vulnerability, PowerPoint attachments, and some light reading. 
Sample needed - of Spybot.ZIF, which scans for vulnerable Cisco Routers 
Samsung Claims iPad Mini, iPad 4, New iPod Touch Also Infringe Patents
Samsung May Start Making ARM Server Chips
Samsung network printer vulnerability discovered
Samsung Opens New Apple Store In Australia
Samsung opens new R&D facility in Nokia's backyard
Samsung printers have secret admin account
Samsung Unveils the Galaxy S4
Samsung will issue fix for security hole in printers
Samsung: Android's Multitouch Not As Good As Apple's
Samsung? BlackBerry? Who Will Win the Containerization Wars?
San Diego Zoo Creates Biomimicry Incubator
Sandia Lab Fires Up 300,000 Virtual Android Devices To Test Out Security
SANS 2006 
SANS Boston 2008
SANS Industrial Control Systems (ICS) Security Training is coming to Houston!
SANS Institute Announces Annual Security East Training Event in New Orleans featuring SANS Technology Institute's ...
SANS Institute to Offer World-Class Information Security and Computer Forensics Training at SANS Secure Singapore 2013
SANS Institute to Offer World-Class Virtualization and Private Cloud Security Training at SANS October Singapore 2012
SANS ISC (once again) and Microsoft - Flatten Compromised Systems 
SANS ISC presentation in Brazil 
SANS ISC Receives Award 
SANS Network Security 2007 -- Vegas 
SANS offering TREATS too. 
SANS Survey Results Announced: Mobility Policy in the Enterprise
Sans Top 20 - 2004 - How does it compare to 2003 Top 20; Microsoft ASP.NET ValidatePath Module; IRC Botnet Servers 
SANS Top 20 Spring Update 
SANS Top 20 Update 
SANS/ISC Webcast; MS05-017 Exploit; They're Baaaaaack...; Follow the Bouncing Malware : A Fresh Bounce (Updated: 22:30 GMT) 
SANSFIRE 2006 
SANSFIRE: Internet Storm Center Training Event 
SANS's Alan Paller discusses the threat of cyberterrorism on CNN, (Sun, Apr 28th)
Santa IM Worm (bot) update 
Santa IM Worm 
Santy Variant?; Year End Poll 
SAP GUI DLL Loading Arbitrary Code Execution Vulnerability
SAP NetWeaver Portal as SAP GRC 10.0 Front-End
Saudi Arabia Blocks Viber Messaging Service
Saudi Aramco Reveals Cyber Attack Hit 30,000 Workstations
SAV botnet revival ? 
sav worm and its cc 
SAV Worm Update 
Save the Web From Software Patents
SC gov. admits hacking errors; revenue chief quits
SCADA kit has hidden factory account, password
SCADA security is better and worse than we think
Scammer tying in on disasters 
Scanner Identifies Malware Strains, Could Be Future of AV
Scanning for Fortinet ssh backdoor
Scanning tricks with scapy
Scans for CA LM Vulnerability; MSFT Update #1: MS05-002; MSFT Update #2: MS05-015; MSFT Update #3: Malicious Software Removal Tool 
SCANS, Babel (not Bagel/Bagle/Beagle) & Halloween 
Scapy vs. CozyDuke
Scientific American's Fred Guterl Explores the Threats Posed By Technology
Scientists Create New Gasoline Substitute Out of Plants
Scientists Develop Sixty Day Bread
Scientists Growing New Crystals To Make LED Lights Better
Scientists Inducted Into Chemistry "Hall of Fame"
Scientists Invent Electronics That Dissolve In the Body
Scientists Match Dream Images To Photos
Scientists May Have Detected Neutrinos From Another Galaxy
Scientists Set Bold Plan For Future Exploration of the Sun
Scientists Take Most Accurate Reading Yet of Universe's Cooling
Scottish Scientists Create World's Smallest Smart Antenna
ScreenOS vulnerability affects Juniper firewalls
Script kiddie scavenging with Shellbot.S, (Wed, Sep 19th)
Scripting the Unofficial .wmf Patch 
Scripting Web Categorization
Scrum/Agile Now Used To Manage Non-Tech Projects
SDBot sniffs, blings 
SDN Is Business, OpenFlow Is Technology
SDN Vendor Comparison Launches
SDN: From Slideware to Software in 2013?
SDN's Potential in the Data Center and On the WAN
Sea Chair Project Harvests Plastic From the Oceans To Create Furniture
Seafood Raised on Animal Feces Approved for Consumers
Sealed-Box Macs: Should Computers Be Disposable?
Searching money, finding exploit 
Searching Through the VirusTotal Database
Seasonal Malwares and other trends 
Seattle Police Want More Drones, Even While Two Sit Unused
SEC staffers used government computers for personal use: report
SEC505 DFIR capture script: snapshot.ps1
Secunia Advisory for IE; meeneemee.exe 
Secunia PSI 3.0 Beta: plugging security vulnerabilities made easy
Secure Boot complaint filed against Microsoft
Secure Remote Services / MyDoom and IFRAME / MS04-039 revision / ISC Webcast 
Security Audit Finds Company's Top Dev Outsourced His Work To China
Security audit finds dev OUTSOURCED his JOB to China
Security audit finds developer OUTSOURCED his JOB to China
Security Awareness (from students point of view) 
Security Awareness and Collaboration
Security Awareness for Security Professionals
Security boffins say music could trigger mobile malware
Security concerns over Firefox's "new tab" thumbnail feature
Security damn well IS a dirty word, actually
Security Features Nobody Implements
Security Firm Mandiant Says China's Army Runs Hacking Group APT1
Security Firm Reveals Weaknesses in DDoS Attack Toolkits
Security Fix for Apache 
Security History Poll Results 
Security History Poll 
Security hole in Sudo's debug option closed
Security Challenges and Games 
Security improvements in Opera 12 beta
Security in the Cloud Is All About Visibility and Control
Security Information on Website 
Security Infrastructure Market to Top $86 Billion in 2016: Gartner
Security Log Retention 
Security Mailing Lists for Academia 
Security Management vs Chaos: Understanding the Butterfly Effect to Manage Outcomes & Reduce Chaos
Security mess sends Kiwi auction site titsup in two days
Security Onion 12.04 Beta Released at DerbyCon (plus informational video)
Security patches for Mozilla Firefox/Thunderbird/SeaMonkey 
Security problem in VMware vSphere 5
Security Pros Love Python? and So Do Malware Authors!
Security Researcher Finds Critical Flaws in Sophos Anti-Virus Engine
Security Researchers Document Wiper Malware`s Disappearing Act
Security Talks for portuguese community 
Security Tip of the day: Handling brute-force login attempts 
Security Update - Cisco 7900 Phones - cisco-sa-20130109-uipphone privilege escallation issue - advisory at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone, (Wed, Jan 9th)
Security Updates from Microsoft; Multiple Vendors - ICMP Affecting TCP Sessions 
Security Vulnerability Found On US Federal Government Contractors Site
Security vulnerability in NVIDIA's proprietary Linux drivers fixed
Security Worker Shortfall is Putting Organizations at Risk
Self-Assembling Robots Using Flying Drones
Senate committee approves privacy protections for cloud, email
Senator Asks FTC to Investigate Google and Apple Over Possible App Privacy Violations (March 5, 2012)
Senators propose law to combat cyber theft
Sendmail DoS Vulnerability 
Sendmail Multi-Part MIME Message Handling Denial of Service vulnarability 
Sendmail vuln 
September 2015 Microsoft Patch Tuesday
Sequoia Supercomputer Sets Record With 'Time Warp'
Serious flaw on OS X in Apple Safari 
Serious Problems With USB and Ethernet On the Raspberry Pi
Set up of Risk Terminator in SAP GRC AC 10.0
SETI@Home site problems 
Setslice Killbit Apps (1 Comments)
Seven Tips to Start Your Cloud Due Diligence
SHA1 Phase Out Overview
SHA-3 Winner Announced
Shamrocks and March Madness; Perl bots; MS05-004 update 
Sharing HBO Go Accounts Could Result In Prison
Sharp Warns That It Might Collapse
Shellbot 
Shelley Stewart: Business view
Sheryl Sandberg: Facebook's Home App Needs Some Work
Should Developers Be Sued For Security Holes?
Should Inventions Be Automatically Owned By Your Employer?
Should the Start of Chinese New Year Be a Federal Holiday?
Should the US Really Limit Chinese-Government Influenced IT Systems?
Should TV Networks Put Pilots Online For Judgement Like Amazon Is Doing?
SHOUTCAST <= 1.9.4 Vulnerability, Exploit Available 
Shuttle Endeavour Embarking to Los Angeles Museum
Schmidt slams China as world's most prolific hacker
Schmidt, Daughter Talk About North Korea Trip
Schneier: We Don't Need SHA-3
School Board Considers Copyright Ownership of Student and Teacher Works
Sidewalk: Certifications in Business Analysis: CCBA & CBAP from IIBA
Sidewalk: Do we really need Business Analysts?
Sidewalk: Tablet Wars
SIEM is not a product, its a process...
Sigcheck and VirusTotal 
Sigcheck and VirusTotal for Offline Machine
Sigcheck and virustotal-search
Significant increase on 38566 
Silent Drop vs Reject Firewall rules 
Silent Traitors - Embedded Devices in your Datacenter, (Mon, Feb 25th)
Silicon Valley's Dirty Little Secret: Age Bias
Silly PuTTY; crime pays; if it quacks like a duck get the orange sauce. 
Simple Way to Recover Password of MS Outlook or Outlook PST File
Simulation Using LRO Data Shows More Locations With Ice on the Moon
sinFP-2.03 release 
Singapore allows pre-crime strikes against online crooks
Singapore inquiry into U.S. engineer's death to start in May
Singapore police to share evidence with FBI on engineer's death
Singaporeans get hard token baked into credit card
Singer Reportedly Outbids NASA for Space Tourist's Seat
Single NFC bonk subjugated Samsung Galaxy SIII and slurped it out
Siri's Creator Challenges Texting-While-Driving Study
Site Updates: ISC/DShield API and ipinfo_ascii.html Page
SKorea misidentifies China as cyberattack origin
SKorea ready for more cyberattacks; banks recover
Sky News Google Play page defaced
Skype Disables Password Reset Function After Security Scare
Skype for Linux hotfix plugs security hole
Skype hits back at angry wiretap reports: Rat finks? Not us
Skype investigates tool that reveals users' IP addresses
Skype Worm Spreads Ransomware, Botnet Links
Skype 'worm' whinnies... 
Skype worm 
Skype; Grepping Weblogs; COAST; ISTS News 
Slackware 14.0 Arrives
Slashdot Asks: SATA DVD Drives That Don't Suck for CD Ripping?
Slate's Mini-Biography of Aaron Swartz
SLOTH, attack on TLS using MD5
Slow day 
Slow Sunday; CA Message Queuing Vulns; Process Explorer Vuln; Infocon: Green Redux 
Small Results With Big Indexes
Smart meter hack framework goes open-source
Smart TVs riddled with DUMB security holes
Smartest Light Bulbs Ever, Dumbest Idea Ever?
Smart-Grid Control Software Maker Hacked
Smartphone 4Q sales rise 36 pct led by Samsung
Smartphones overtake 'dumb' phones worldwide
Smoothing MODEL, K?
Smooth-Talking Hacker Remote-Wipes Reporter's iPad, MacBook
Sniffer tool displays other people's WhatsApp messages
Sniffers in Perl?!? 
SNMP Issues in Cisco Routers; Vulnerability Issues in TCP; SANS Top-20 Call for Experts 
SNMP Pwn3ge
Snort 2.4.2 Released 
Snort BO pre-processor Vulnerability 
Snort BO status update 
Snort bypass vulnerability 
Snort Denial of Service Vulnerability 
Snort Rule released on BleedingSnort for the Windows Javascript vulnerability 
Snort rule update 
Snort rulez management 
Snort Sig for MS06-040 
Snort signature and standalone detection tool 
Snort Sigs for MS06-042 and ICMP tunnel mentioned in Diary 
Snort URL evasion vulnerability patched and version 2.6.0 available 
Snow Leopard users most prone to Flashback infection
So many devices, so little policy
So what passwords are those ssh scanners trying?, (Tue, May 14th)
So you broke our encrypted files? Ha! They were DOUBLY encrypted
So, what causes recession?
So, when is a security advisory, not a security advisory? 
Soap Boxing 
Sober Virus (CME-151) 
Sober, Bagles, and Mytobs ad nauseum... 
Sober.I is on the go; Quiet day on the net 
SoberD@MM from spoofed Microsoft email addresses, new version of Netsky 
SoBig Virus Update 
SOBIG.F 
Sobig-F and Nachia update 
Sobig-F hybernation 
SOC Resources for System Management
Social Commerce Is Future of Electronic Commerce
Social Media, Companies and Data Volumes
Social Networking Security in the Workplace
Social Networking Sites- An Educational Tool
Socialite's climb halted by unfolding scandal
SoftBank would appoint "security director" to Sprint board
Software DEP Classified Script 2.5 SQL Injection Vulnerability
Software exploits dropped to new low in 2011, says IBM X-Force
Software Patches, Nortel, User Privacy Top Week's Security News
Solaris 9 in.ftpd security flaw 
Solaris telnet/rlogin cont.; Timezones; DNS queries 
SolusOS Forks Gnome 3 Fallback Mode
Solution to the TCP 1433 Traffic 
Some Android phones can be reset to factory default by clicking on links, (Wed, Sep 26th)
Some more 0-days from ZDI
Some password advice
Some Smart Meters Broadcast Readings in the Clear
Some tools updates
Some useful volatility plugins 
Somebody, Probably Anonymous, Hacked the Fed During the Superbowl
Something new on Telnet? 
Sony Announces 'Superslim' PS3
Sony Announces the PS4
Sony cuts sales target for cameras, smartphones for 2014-15
Sony DRM Rootkit to be removed automatically by Microsoft 
Sony Fined $390K in U.K. for 2011 PlayStation Network Data Breach
Sony mobile customers emails, names hacked in China
Sony PS Vita exploit opens the door for unauthorized apps, piracy
Sony redo of PlayStation Store links games, movies
Sony to assess spin-off plan; cuts targets for cameras, smartphones
Sony To Make Its Last MiniDisc System Next Month
Sony Touts 25 Hour Battery Life For Haswell-Equipped Vaio Pro
SOPA, PIPA, Anonymous: Can I have a little hope?
Sophos buys mobile device management vendor Dialogs
Sophos dangles free Android antivirus to tempt BYOD-friendly biz
Sophos false positives on Mac OS X 
Sophos Reveals the "Dirty Dozen" 
Sourcefire VRT MS-WORD 0DAY recommendations, Rules and tool Advisory 
South Carolina tax chief resigns after taxpayers hit in cyber attack
South Korea Backtracks On China As Source of Cyberattack
South Korea cyberattacks hold lessons for U.S.
South Korean crackers arrested
SP2 breaks nmap, others - *Anti*phishing - Application exploits 
Space Diving: Iron Man Meets Star Trek Suit In Development
Space Shuttle Endeavour's Final Journey
Space Station Saved By a Toothbrush?
Space Station Spacewalkers Stymied By Stubborn Bolt
SpaceX Dragon Set To Launch
SpaceX: Lessons Learned Developing Software For Space Vehicles
Spaf on reexamining 
Spain's Extremadura Starts Move To GNU/Linux, Open Source
Spam - spam - spam 
Spam ahoy! 
Spam Backscatter 
Spam blocking by RBL, when is a good thing too much? 
Spam Delivered via .ICS Files
SPAM in German is Still SPAM 
Spam Increase 
Spam reporting addresses 
Spam with Obfuscated Javascript
Spam, Recon or ??: You make the call!! 
Spamassassin - upgrade 
Spamhaus DDoS Attack Investigation Results in Arrest of Dutch Man
SPAM-Let the time fit the crime; 
Spammers attempt to defeat Bayesian filters; Malaysia terrorism warning; MSN Messenger worm 
Spammers dodge junk filters with Google Translate
Spammers unleash DIY phone number slurping web tool
Spammers, phishers escape proper punishment
Spamming as 'terror' tactic 
Spanish Open Source Group Files Complaint Over Microsoft Use of UEFI Secure Boot
Spanish police arrest suspected developer of BKA trojan
Spat between two Dutch companies sparks record-breaking 300Gbps DDoS attack
Speaking of Predictions 
Speaking of Said Upgrades… Firefox 1.0.7 
Special Microsoft Bulletin Patching Remote Code Execution Flaw in OpenType Font Drivers
Special Ops Takes Its Manhunts Into Space
Spectacular New Views of Saturn's Polar Vortex
Speed traders eyed after Twitter hack attack: regulator
Speech-to-text drives motorists to distraction
SplitRXMode - Taking VMware Multicasting to the Next Level
Sploits Du Jour: Veritas NetBackup & Ethereal. Watch Oracle and Snort! 
Sporadic Problems, Internet Health Monitors, IE Attacks, and HTTP GET 
Spy Gadgets: A Visit With the Real-Life Q
Spyware Report Disected and Thanks For The Malware 
Spyware Tool Kit, OSPF Filtering & Authentication, Port 559 Traffic Spike 
SQL Injection Flaw in Ruby on Rails, (Wed, Jan 9th)
SQL Injection Lilupophilupop style, Part 2, (Thu, Aug 9th)
SQL Injection: Paper & Worm, WINS, Asking for Input. 
SQL Model Clause: References and Recommendations
Square Kilometre Array Pathfinder Goes Live
SquirrelMail 1.4.8 released 
SSD Prices Fall Dramatically In 2012 But Increase In Q4
SSH Honeypot Capture, Follow The Bouncing Malware (Part III) 
SSH Honeypots (Ab)used as Proxy
SSH scanning continues, some simple advice; IPS comparison article 
SSH Scanning Resolved; First Things First Guide 
SSL 2.0 Rollback in OpenSSL 
SSL Phishing Scam / FreeBSD DoS Vulnerability / Acrobat Reader Flaw 
SSL Requests sent to port 80 (request for help/input), (Thu, Sep 6th)
SSL, SSL - Where Art Thou SSL?
Standard Kilogram Gains Weight
Stanford Study Flawed: Organic Produce May Be More Nutritious After All
Stanford Uses Million-Core Supercomputer To Model Supersonic Jet Noise
Stanford's Flying Fish Glider
Staples Starts Selling 3-D Printer
Startup decloaks, rolls out cloudy security 'conductor'
State of the Union: Full text of President Obama's address
State social media privacy laws a mixed bag for businesses
Statistical Tools For Detecting Electoral Fraud
Statistics Key To Success In Run-and-Gun Basketball
Staying Secure During ERP Implementation: What to Look Out For
Stealing photos and spying: backdoors to networked cameras
Stealthy Apache Exploit Redirects Victims to Blackhole Malware
Stealthy Group Steals Data Using Zero-Day, 'Watering Hole' Attack
Stealthy, malware-spewing server attack not limited to Apache
Steam spawns vulnerabilities, say researchers
Steelie Neelie admits laptop hack during IGF
Stem Cell Treatment Found Effective For Rare Brain Disorder
Steps to Mitigate Office Vulnerabilities 
Steve Jobs Movie Clip Historically Inaccurate, Says Woz
Still a Microsoft Most Valuable Professional (6th year!)
Still More MyDoom, a Few Twists on IDS, and a New Phishing Threat 
Stolen Laptops 
Stop calling it a ransomware "attack"
Stopping Spam by Extrusion Detection 
Storage and expertise - the PureSystems box
Storm Center in the News 
Storm Season 
Strange file names being requested from a web server 
Strange Http request... 
Strange phishing/spam e-mails 
Strange Spam; Update on Port 3001; New Discussion Forum; Small Website Change; Cisco Humor; SANS Washington DC 
Strange UDP Packets, Amazon.com and LATAM NIC Issues 
Stratfor Hacker Could Be Sentenced to Life, Says Judge
Stress-Testing Software For Deep Space
Student mules, More database holes, Microsoft spyware beta 
Student privacy activists due to meet with Facebook
Student Refusing RFID Badge Now Fights Expulsion Order
Students Calculate What Hyperspace Travel Would Actually Look Like
Study Finds Universe Is 100 Million Years Older Than Previously Thought
Study says malware attacks are on the rise, mobile threats becoming more serious
Study Urges CIOs To Choose Open Source First
Study: Geolocation apps draw users, despite privacy concerns
Study: Limiting Bidding On Spectrum Could Cost Billions
Study: Online Social Influence Has the Strongest Effect On Voting Behavior
Study: the Universe Has Almost Stopped Making New Stars
Stuxnet worm planted on Iranian PCs via USB stick, site claims
Submitting Malware - Unpatched IE Hole Being Exploited - eJihad or iHysteria? 
Substantial Increase in Infected System Numbers (is it real?) 
Sudo For Windows 
Sugar Batteries Could Store 20% More Energy Than Li-Ions
Summer/Winter Vacation Book Suggestions and Hacking Challenges 
Sun bulletins, MS04-040 discussion, anti-spam vigilante-ism dumb, did you know? 
Sun Java JRE sandbox bypass vulnerability 
Sun Java Runtime Environment XML Parsing Denial of Service Vulnerability
Sun Java SDK and JRE Updates 
Sun JDK 5.0 Update 10 
Sun JRE Privilege Escalation, Opera Vulnerability, Pocket PC Trojan in the wild 
Sun ONE Messaging Server Vulnerability; Weaknesses in Wireless LAN Session Containment; Credit Card Breach 
Sunday P & Q; Happy Birthday OpenSSH; RBOT Snort Sig; Bacula 
Sunday, little to report, and backups 
SunJava 1.5.0_09 Released 
Super Bacteria Create Gold
Supercomputer Repossessed By State, May Be Sold In Pieces
Supercomputers' Growing Resilience Problems
Super-Earth Discovered In Stars' Habitable Zone
Superfish 2.0: Dell Windows Systems Pre-Installed TLS Root CA
'Super-powerful' Flame worm actually boring BLOATWARE
Superstition 
Support Forums Reveal SCADA Infections
Supreme Court To Decide If Monsanto GMO Patents Are Valid
Surface Pro Sold Out; Was It Just Understocked?
Surface Pro: 'Virtually Unrepairable'
Surfing Robot Tracks Great White Sharks
Surge in Exploit Attempts for Netis Router Backdoor (UDP/53413)
Surveillance software: Gamma Group's offshore companies uncovered
Survey on Application Portfolio Management–What is your organization doing?
Survey Reveals a Majority Believe "the Cloud" Is Affected by Weather
Survey Suggests P2P Users Buy More Music
SUS: deadline extended - XP SP1 not supported anymore 
Suspicious eFax Spear Phishing Messages, (Fri, Aug 17th)
Swartz' death fuels debate over computer crime
Swedish Data Center Saves $1M a Year Using Seawater For Cooling
Swedish School Makes Minecraft Lessons Compulsory
Sweet Treats from the Honeynet group. 
Swiss security day 
Switching Tasks Changes Worker Bee DNA
Syfy Reality Show Will Feature Giant Boxing Robots
Symantec Antivirus Scan Engine: Web Service Administrative Interface Buffer Overflow 
Symantec AV linked to Verisign certificate problem, DUGallery, False Weather Alerts, more phishing 
Symantec AV RAR library vulnerability 
Symantec AV Vulnerability Latest 
Symantec beats estimates on demand for security products
Symantec CEO takes over global sales chief's job, shows him door
Symantec detecting NSIS as trojan.zlob. 
Symantec DOS Exploit Code, Sasser Backdoor Exploit Capture, Reading Material 
Symantec finds Linux wiper malware used in S. Korean attacks
Symantec forecasts weak results as yen depreciates
Symantec Patch Posted 
Symantec Products Vulnerabilties / Worm Password List / Mailbag-Netsky 
Symantec retires low-end security software
Symantec Scan Engine Multiple Vulnerabilities 
Symantec Sees Links Between 2011, 2013 Cyber-Attacks on South Korea
Symantec update blocks access to AOL 
Symantec VERITAS Storage Exec DCOM Server BO's 
Symantec: don't blame us for New York Times hack
Symantec: Flashback malware netted upwards of $10,000 a day
Symbian operating system - Nokia series 60 mobile phones - 3 new Trojans 
Symbian Sells Millions, Despite Nokia Pushing Windows Phone
SYN-ACK Packets With Data
Syncing Between Devices
Synthetic Materials Set New World Record For Greatest Amount of Surface Area
Syria drops from Internet 7th May 2013, (Wed, May 8th)
Syria Falls Off the Internet Again
Sysadmin Appreciation Day 
Syslog'n with the best of 'em; 
System Architecture Test Plan (Expanded)
System Documentation: Application Software
System Documentation: Working System
System Resource Utilization Monitor
System Spec: External (Human) Interface
System Store Trojan, Infection Persistence, Save the Pr0n 
TACC "Stampede" Supercomputer To Go Live In January
Taiwan Earthquakes cut undersea cables 
Taiwan security official warns of crippling Chinese cyberattacks
Taiwan to ramp up cyberwar efforts
Taiwan's civil servants caught by sexy email trap
Take a Free Networking Class From Stanford
Take Back Wednesday? SQL Slammer... still alive but barely kicking
Taking a Hard Look At SSD Write Endurance
Taking a Look at the FreeVideo Player Trojan 
Taking Action For Free JavaScript
Talented and Creative Group We Are 
Taliban official's email blunder leaks 400+ contacts
Talking to Kids About Online Porn: How One Dad Handled it
Tap Gigabit Networks on the Cheap
Targeted attack: experience from the trenches 
Targeted attack: Word exploit - Update 
Targeted Attacks Increased, Became More Diverse in 2011
Targeted IPv6 Scans Using pool.ntp.org .
Targeted Trojan attacks? 
Tata Intends To Sell Air-Powered Car In India
Tax Day and associated risk 
Tax Day and recovering from San Diego; Oracle patches; IRC spam worm 
TCP 554 scanning; Linux mremap local root exploit posted 
tcp bindshell with password prompt in 162 bytes 
TCP Fuzzing with Scapy, (Thu, Sep 13th)
TCP port 10000 cont. / Connecting mismatched protocols 
TCP port 1025 activity; continued DNS poisonings; 802.11 security primer 
TCP Port 8181 Puzzle 
tcp/135 and ICMP Continue to Decline; Solaris 8 Hacks 
TCP/1433 spike: Call for Packets. 
Teenager Makes Discovery About Galaxy Distribution
Teens arrested in connection with attack on UK Police Agency
Teens Drug Parents To Get Web Access
Teens, Social Media, and Privacy
Tech tip follow-up: Using the data Invoked with R's system command
Tech tip: Invoke a system command in R
TechCrunch:Expanded DMCA Still Has Limits
Technical document on WMF vulnerability and Guilfanov's patch available 
Technical Mujahid Magazine 
Television Network Embeds Android Device In Magazine Ads
Telnet client vulnerability; DNS posioning re-appearing 
Telstra Bigpond To Use Outlook.com As Email Handler
Temporary Patches for createTextRange Vulnerability 
Tens of millions of hackers target Israel government websites
Tesla CTO Talks Model S, Batteries and In-car Linux
TeslaCrypt ransomware sent using malicious spam
Test File: PDF With Embedded DOC Dropping EICAR 
Test Gallery - VMware
Testing for DNS recursion and avoiding being part of DNS amplification attacks
TestLink v1.9.3 Arbitrary File Upload Vulnerability
Tests Show That Deadly New Flu Could Spread Among People
Texan schoolgirl expelled for refusing to wear RFID tag
Texas Attorney General Warns International Election Observers
Texas Company's Antique Computers Are For Production, Not Display
Texas School Board Searching For Alternatives To Evolutionary Theory
Texas State Rep. Files 2 Bills To Ban RFID In Schools
Thai PM's site defaced with smutty abuse
Thanks for info on chat monitoring; PanadaLabs report; Hyper-Threading vulnerability 
Thanx to our readers 
That Peculiar Genetics of Mathematics
The "Yes, but..." syndrome
The 1 Train Hackers Stole $2.4 Million from 2,904 ATMs in Just 10 Hours
The 3D Un-Printer
The 7 Craziest Intelligence Leaks in US History
The 80's called - They Want Their Mainframe Back!, (Wed, Jan 9th)
The 866-PC-SAFETY poll 
The Agony And Ecstasy Of The Oracle 11gR2 Upgrade
The Algorithmic Copyright Cops: Streaming Video's Robotic Overlords
The AP Twitter hack: Wall Street's tweet-scraping technology that sparked a 145-point nosedive
The Arcati Mainframe Yearbook 2013
The asymmetry implicit in Internet data retention
The ATF Not Concerned About 3D Printed Guns... Yet
The Beast 
The best anti-Obama book I've read
The biggest cyberattack in Internet history
The Biggest Financial Fraud of All Time
The British Have All The Fun
The Bronies Get Their Own Charity
The Case For Targeted Ads
The Case for UC Interoperability
The CIA and Jeff Bezos Bet $30 Million On Quantum Computing Company
The Cloud Ecosystem - Just Getting Started
The Cloud Wars
The Coming Internet Video Crash
The Computer Science Behind Facebook's 1 Billion Users
The Current Cloud Landscape
The cyber debate goes public
The Cyber Threat To the Global Oil Supply
The Danger In Exempting Wireless From Net Neutrality
The dangers of shared web hosts 
The Dark Side of Certificate Transparency
The Data Crunchers Who Helped Win The Election
The Empire Hacks Back Challenge: Test Your Windows Command-Line Kung Fu 
The era of big DDOS?
The Family System Administrator 
The Faraway Cloud: Measuring Cloud Performance
The FBI Is Now Investigating the Steubenville Backlash
The FBI will turn off the Internet on Monday (or not), (Mon, Jul 9th)
The FBI's reported new plan to read your emails
The Foldable Readius Ereader Is Dead
The Foundation of Your ATS Should be a CRM
The Free State Project, One Decade Later
The FSF Adopts the Kickstarter Approach To Fund-raising
The Full Text of President Obama's 2013 State of the Union Address
The Gates Foundation Engages Its Critics
The government wants to know what it doesn't know
The H Roundup - AMD fires developers, Android turns 5, E17 alpha arrives
The H Roundup - Bogus leap seconds, EFI rootkits and cloud cracking
The H Roundup - Linux Mint 15 RC, WebM patents, Google drops XMPP
The H Roundup for the week ending 12 May
The H Roundup for the week ending 14 July
The H Roundup for the week ending 17 March
The H Roundup for the week ending 18 February
The H Roundup for the week ending 19 May
The H Roundup for the week ending 2 June
The H Roundup for the week ending 23 June
The H Roundup for the week ending 24 March
The H Roundup for the week ending 28 July
The H Roundup for the week ending 9 June
The H Roundup for the week ending May 5
The History of the Floppy Disk
The Hunt For LulzSec's Missing Sixth Member
The chocolate / attack correlation 
The importance of ongoing dialog
The Intelligence Cycle for a Vulnerability Intelligence program on-the-cheap 
The Internet Plays Role of Stupidity Amplifier
The ISC is not Trying to Trojan Your Machines 
The Largely Unknown Success Story of Afghanistan's Television Network
The Linux-Proof Processor That Nobody Wants
The Long Reach of US Extradition
The Mathematics of the Lifespan of Species
The Matthew Keys Case Shows Just How Big a Bully the Feds Can Be
The missing Microsoft patches 
The Mobile App Design Tail Wags the Desktop Software Design Dog
The most hated IP address of 2005 ? 
The MS Claria debate; Intrusions via MS05-017; some more light reading 
The New AI: Where Neuroscience and Artificial Intelligence Meet
The New Series of Doctor Who: Fleeing From Format?
The Olympic Live Stream: Observations, Recommendations, Predictions
The other Juniper vulnerability - CVE-2015-7756
The Passing of the Personal Computer Era
The Passwords You Should Never Use
The Perils of Vendor Bloatware
The Pirate Bay supporters hack Virgin Media
The Pirate Bay's Oldest Torrent Is Revolution OS</em>
The Pitfall Of Two Factor Authentication 
The Privacy Illusion
The Prototype Still Works; Insider Threat Paper; More Keylogging; Translation 
The Rapid Rise of License Plate Readers
The reasons you should attend IOD 2012 aren't always technical
The Release Candidate For Linux Mint 14 "Nadia" Is Out
The Return of CISPA
The Rise of Paid Wikipedia Consulting
The Risks of Trusting Experts
The Science Behind Building a Space Gun
The security risks and rewards of big data
The Short Life of a Vulnerable DVR Connected to the Internet
The Shumway Open SWF Runtime Project
The Sleuth Kit (TSK) for Windows released 
The Snort Top 10 
The SPAM People;Thanks;Package Verification 
The Strange Nature of the Nigerian App Market
The Struggles of Getting Into the App Store
The Tech Behind Felix Baumgartner's Stratospheric Skydive
The Three Pillars of Data Warehousing
The Tiny Console Killers Taking On the PS4 and Xbox 720
The Top 10 - The Best Conversations Happening Right Now
The Top 5 Reasons Cloud Computing Projects Fail
The Top Paying Tech Companies For Interns
The trouble with talking to computers.
The Twelve Days of Christmas Packet Challenge 
The Two Big Problems With Online College Courses
The Ultimate OS X Hardening Guide Collection, (Mon, Feb 20th)
The ultimate tips box
The Value a "Fresh Set Of Eyes" (FSOE)
The White House's Next Enemy: Botnets
The Wordpress Plugins Playground
The World Remains Five Minutes From Midnight
The worst security snafus of 2012 – so far
There are no more Passive Exploits 
There Is No Reason At All To Use MySQL: MariaDB, MySQL Founder Michael Widenius
They didn't predict that: Astrologers! blamed! after! Yahoo! hack!
They Work Long Hours, But What About Results?
Think Tank's Website Rejects Browser Do-Not-Track Requests
Third Party Debates Moderated by Larry King: Discuss
Third-party apps ripe targets for cybercriminals, Secunia says
Thirty Six Days to Dreamforce
This Article is Brought to You By the Letter ノ
'This Is Your Second and Final Notice' Robocallers Revealed
This Week's Top 10 Discussions
This Week's Top 10 Discussions - April 29, 2013
This Week's Top 10 Discussions - May 6, 2013
Thomson Reuters employee indicted for aiding hackers -court filing
Those never-ending waves of Locky malspam
Thoughts about Informix 
Thoughts on PCI (Payment Card Industry) compliance requirements 
Thoughts on VoIP, Holiday recommended reading 
Thousands of Kuwaitis protest against voting changes
Thousands of Publicly Accessible Printers Searchable On Google
Thousands of Publicly Addressable Printers Searchable On Google
Threats in the Cloud Environment SSH Scanners
Three Mile Island Shuts Down After Pump Failure
Three reasons you shouldn't neglect your application security
Three Ways Cloud Computing Providers Shoot Themselves in the Foot
Thunderbird Download Link 
Tibetan and Uyghur activists targeted with Android malware
Tim Bryce - COMMON COURTESY - 9/24/2012
Tim O'Reilly Steps In To Debate Open Government and Linux
Time for some predictions
Time to run Windows Update - - Microsoft Updates KB2755801 for Windows RT / IE10 / Flash Player - http://technet.microsoft.com/en-us/security/advisory/2755801, (Wed, Oct 24th)
Time to update Mozilla/Firefox/Thunderbird and Ethereal; also: sightings of infected IIS 6 servers. 
Time to upgrade Ethereal... 
Time Zone Updates, Part 2 
Times sued over police hacking
Tiny Pill Relays Body Temperature of Firefighters In Real-time
Tip of the Day - Backup and Backup Management for Home or Small Business Users 
Tip of the Day - Color and Bar Coded Daily Risk Analysis 
Tip of the Day - Fleshing out the details in email policy 
Tip of the Day - Home Wireless Gateways 
Tip of the Day - If you don't need it on, turn it off. 
Tip of the Day - Like a Kid in a WMIC Candy Store 
Tip of the Day - Making the Switch 
Tip of the Day - PHP Security 
Tip of the Day - Protecting HP JetDirect-based Printers 
Tip of the Day - Turn the NICs off during installation 
Tip of the Day : snort rule management 
Tip Of The Day 
Tip of the Day: Audit 
Tip of the Day: Be unpredictable and diverse 
Tip of the Day: Don't be a victim (well try to not be a victim) - security toolbars 
Tip of the Day: Logbooks 
Tip of the Day: mount options 
Tip of the Day: Protect the Single Points of Compromise 
Tip of the Day: Read e-mail in plain text (as God intended) :) 
Tip of the Day: Remove Default Route 
Tip of the Day: Secure Surfing at the Coffee Shop (or Hacker Conferences) 
Tip of the Day: Standards 
Tip of the Day: Strong Passwords 
Tip of the Day: Surviving the monthly patch cycle 
Tip of the day: Test, don't ping 
Tip of the Day: The -they shall not be broken into- challenge 
Tip of the Day: Turn off your Computer 
Tip of the Day: Use ssh keys 
Tip of the Day: Use the features of your switches 
Tip of the day: using host based firewall on Windows XP SP2 
Tip: Quick Analysis of Office Maldoc
Tippingpoint IPS DoS 
Tips for Stopping Ransomware
T-Mobile patches Wi-Fi eavesdrop vuln
To protest Israel's Gaza offensive, 'Anonymous' launches millions of cyberattacks
To report any scams/malware related to Hurricane Matthew, use our contact form: https://isc.sans.edu/contact.html
To SSL or not to SSL - send us your links! 
ToD - Configuration Management - maintaining security awareness 
Today's Locky Variant Arrives as a Windows Script File
Tolkien Estate Sues Over Lord of the Rings</em> Slot Machines
Tomcat IR with XOR.DDoS
Tool Released to Decrypt Petya Ransomware Infected Disks
Tool Tip: Kansa Stafford released, PowerShell for DFIR
Tool updates and Win 8, (Sun, May 6th)
Tools released at Defcon can crack widely used PPTP encryption in under a day
toolsmith #112: Red vs Blue - PowerSploit vs PowerForensics
Top 100 security tools 
Top 20 Internet Status Sites 
Top 20 update; IM malware and IRC bots are the flavor of the day; Sober variant 
Top 6 Mashable Comments This Week (Mashable)
Top20 List Updated; TCP/1433 Remains Elevated; ZoneAlarm 6.0 Released; The Penetrating Packets: Spam E-Mail 
TOR servers seized by police in Germany 
Torvalds Takes Issue With De Icaza's Linux Desktop Claims
Total Solar Eclipse Bedazzles Northern Australians
Tour of the Deep Underground Science and Engineering Lab
TR-069 NewNTPServer Exploits: What we know so far
Tracking HTTP POST data with ELK
Tracking Privileged Accounts in Windows Environments
Tracking SSL Certificates
Trade Group: US Software Developer Wages Fell 2% Last Year
Trading Privacy for Convenience
Traits of a Software Professional
Treasure Your Trials
Trend Micro unearths more links between China and hacker group
Trends in malware installers, Oddbob is back, .ANI file followup, and SMTP oddities redux. 
Treo 700w DST Ooooops! 
Trevor Eddolls - IBM Champion 2012
Tricks for DLL analysis
Trisquel 6.0 'Toutatis' Is Now Available
Trojan attack on Maplesoft customers
Trojan Disguised as Microsoft Patch; Identity Theft 
Trojan dropper in Power Point - a new issue? 
Trojan exploiting MS05-053 - TROJ_EMFSPLOIT.A 
Trojan postcards; Using authorized apps to do bad things; More IE and Outlook problems? 
Trojan.Mdropper.Q / Email Attachment Practices 
Trojanized SSH Daemon In the Wild, Sending Passwords To Iceland
Trouble At OnLive
Trouble Brewing? - Port 106 Activity 
Trusteer Identifies Universal Man-in-the-Browser Attack Technique
Trustworthy Computing 
TSA Says Screening Drinks Purchased Inside Airport Terminal Is Nothing New
Tsunami.exe, Oracle critical patch update, got packets? 
Turkey Lurkey brings state of calm to the net -- well, almost 
Turkish agency blamed by U.S. companies for intercepted Web pages
Turkish Registrar Enabled Phishing Attacks Against Google
Turning SF's Bay Bridge Into a Giant LED Display
TV station hacker warns of zombies in Montana
Twas the night before Christmas, when all through the house Not a creature was stirring, not even a mouse. 
Tweet-to-buy? American Express says yes
Twin Craft To Study Space Weather From Within Earth's Radiation Belts
Twitter Based "Ted" System Warns of Earthquakes Earlier
Twitter Breached, 50k Accounts Posted to Internet
Twitter clients stay signed in with pre-breach passwords
Twitter hires Apple’s hacker nemesis to boost its security team
Twitter jumps on Do Not Track bandwagon
Twitter locks down logins by adding two-factor authentication
Twitter Resets 250,000 User Passwords After Cyber-Attack
Twitter spam campaign infects users with fake antivirus programs
Twitter stumble causes outage, not hactivist
Twitter suffers malware spam outbreak
Twitter Tells News Organizations to Expect Even More Hacks in the Future
Twitter's Vine App Ready To Bomb Internet With GIF-Like Videos
Two great books for aspiring "data scientists"
Two Heads Are Better Than One For Brain-Computer Interfaces
Two Changes To Quirky Could Change The World
Two new Internet Explorer vulnerabilities disclosed including PoC 
Two New Sober Viruses on the Loose Today 
Two subsystem parameters (DSNZPARM keywords) have been added in support of DDF (and other DDF enhancements...)
Two subsystem parameters have been added in support of DDF (and other DDF enhancements...)
Two Things I Wish Companies Cared More About: Cloud & Acquisitions Risks
Two-factor authentication Defense Mechanisms 
Two-Way Firewall in Windows Vista and Microsoft OneCare 
Tylenol May Ease Pain of Existential Distress, Social Rejection
Typo Squatting Charities for Fake Tech Support Schemes
Typo-Squatting and Password Best Practices 
U.N. nuclear agency says hackers stole information
U.S Law Enforcement Agencies Increase Warrantless Electronic Snooping
U.S. Army, Target, others advertising on pirate sites
U.S. bank website hackers used advanced botnets, diverse tools
U.S. carriers line up against texting while driving
U.S. Congress urged to probe Chinese cyber-espionage
U.S. cyber warrior accuses China of targeting Pentagon
U.S. defense chief says pre-emptive action possible over cyber threat
U.S. group studying breach at Schneider unit
U.S. lawmakers to introduce new bill to punish cyber theft
U.S. looks into claims of security flaw in Siemens gear
U.S. panel urges wariness as Chinese investment grows
U.S. report says major weapons designs compromised by Chinese
U.S. Seeks Power to Wiretap Web Services, Including Google, Facebook
U.S. seeks to tackle trade secret theft by China, others
U.S. seeks to tackle trade-secret theft by China, others
U.S. Senator Takes Wrong Turn on DOJ's GPS Tracking Requests
U.S.-Israel project with Motorola leads to security-hardened industrial control system
UAC Bypass in JScript Dropper
Ubisoft assassinates Uplay flaw, denies DRM rootkit
Ubisoft DRM opens backdoor
Ubuntu Developing Its Own Package Format, Installer
Ubuntu Gnome Remix 12.10 Arrives For Testing
Ubuntu install passwd in log 
Ubuntu Isn't Becoming Less Open, Says Shuttleworth
Ubuntu Touch Developers Aim for Daily Phone Usability Before June
uCertify Online Prep Kit - Software Review
UDP port 1434 directed attack to AS13489 IP ranges, (Fri, May 24th)
UDP Port 47290 
UDP traffic to port 50368 
UDP/1030 (continued) 
udp/1030 Increase 
UDP/4081 Spike 
UK Authorities Threaten To Storm Ecuadorian Embassy To Arrest Julian Assange
UK biz pays heavy price for skimping on security - PwC
UK Broadband Plan Set To Clear EU Approval
UK cookies cop changes own policy to ‘implied consent’
UK Court: MPAA Not Entitled To Profits From Piracy
UK Critical Infrastructure and Business Trojan Attacks (Updated), imap scanning, Opera vulns, Adobe Reader/Acrobat vuln, NIST Control Tool, Mailbag 
UK Government Owns 16.9 Million Unused IPv4 Addresses
UK Government Spending £6,000 Per Computer Every Year To Maintain Desktops
UK Gov't Official Advises Using Fake Details On Social Networks
UK hacker jailed for nicking PayPal, banking data from MILLIONS
UK charges teenager for alleged jamming of anti-terrorist hotline
UK lawmakers say Huawei-BT deal exposes flawed security controls
UK License Plate Cameras Have "Gaps In Coverage"
UK Ministers' Private Communications Subject To Freedom of Information Act
UK Police Fined For Using Unencrypted Memory Sticks
UK Police Now Double As CCTV Cameras
UK police: Man charged in UK soldier's murder
UK.gov to spunk £2m a year policing global cyber-security
UKNova TV Torrent Tracker Shut Down After FACT Issues C&D
Ultra-hackable Google Glass could be a security nightmare
UN: More international cooperation needed to fight cyberterrorism
Unauthorized Change Detected!
Unencrypting Extortion Malware 
Unidentified E-mail worm, PHP server vulnerabilities, MS SMS Client DoS 
Uninstalling Problem Applications using Powershell
Unity Makes Strength
Universal IPSec VPN client for Android 4.0
University Security Problems and Another CHM exploit in the Wild 
Unix/Linux Steals the Show!
Unpatched exploit gets publicity 
Unpatched Vulnerability in Firefox used to Attack Tor Browser
Unreal Engine Heap Overflow, RBOT.CC, ISCAlert 
Unscrambling an Android Telephone With FROST
Unspecified Vulnerabilities in Flash 
Unusual Discovery of New African Monkey Species
Unusual New Species of Dinosaur Identified
Update - Symantec RAR File Parser Remote Heap Overflow 
Update 20:10 GMT 2004-1-28: New variant of Novarg/MyDoom found, Microsoft Changing IE's URL Handling, Solaris Local Privilege Escalation 
Update Firefox to 1.5.0.1, the exploit is out 
Update for Intel(R) PRO/Wireless 3945ABG Network Connection Software bugs 
Update for Windows Update has teething troubles
Update from Microsoft Not Included in April 2006 Bulletin 
Update on MS06-042 and CA Unicenter Service Desk 
Update on Postcard virus emails 
Update on Symantec Elevation of Privilege Vulnerability 
Update on the Paypal Phish Phlaw 
Update on the SUS issues 
Update on the UDP strange packets 
Update on TrendMicro Pattern 594 Issue; W2K Mainstream Support Ending June 30, 2005; My Computer Has a Rash 
Update on Word 0-Day Issue 
-UPDATE- Sasser Worm , Week in Review; LSASS Exploit Analysis; SANSFIRE 2004 
Update to MS04-025; Windows 2003 Guides Released; Port 3072; Your Daily Phish 
Update/Fix for MS06-049 
Update: Malware Analysis: Tools of the Trade 
Update: New Windows XP SP2 vulnerability; MS Patches reports; Bad, Bad Spam... 
Update: Paypal Phish Conditioning; DNS Denial of Service Vulnerability; CA Vet Library Vulnerability; Combating Windows Malware Tutorial 
Update: Sasser.d to start the work week, clean up tools may not be adequate 
Updated (13:45 3/18 GMT): OpenSSL DoS Vulnerability, New Bagel Variants 
Updated Acrobat Snort Sig / Cisco Advisory / Distributed Vulnerable Scripts Scans/ Diary Foot-note 
Updated DShield Blocklist
Updated Malware Domain List 
Updated Model Puts Earth On the Edge of the Habitable Zone
Updated MSIE VML Remote Buffer Overflow Exploit Code Released 
Updated Packet Attack flash animation 
Updated PFSense Client
Updated RSS Feed 
Updated Twiki Snort Sig 
Updated version of Ilfak Guilfanov's patch 
Updated Windows Registry Concealment Info;Symantec AV Vulnerability 
Updated(2): Checkpoint VPN-1 ASN.1 vulnerability, RADIUS and wireless, reminder about home routers 
Updated: Bagle C Virus. New Vulnerability in RealSecure and BlackIce Products, Solaris 8 and 9 passwd(1) bulletin, WinZip flaw, IE cross-frame scripting issue 
Updated: IWAP_WWW account on compromised IIS servers 
Updated: MS04-011 LSASRV Exploit; Sasser Worm Update: Sasser.b 
Updated: Security bulletins from Sun, more Dameware 
Updates on DNS Poisoning / Peru Offline / Mailbag and other stories... 
Updates on IE vulnerability 
Updating early and often; NPR gets it right 
UPEK fingerprint scanners insecure, says Elcomsoft
Upgrading ODI to 11g
Upgrading Software From 350 Million Miles Away
UPnP Problems 
UPnP scan shows 50 million network devices open to packet attack
UPS raises dividend to 62 cents from 57 cents
URGENT: New version of Beagle hitting 
US accused of hypocrisy over cyber warfare
US activist released from Vietnam after 9 months
US Activists Oppose US Govt Calls To Weaken EU Privacy Rules
US Air Force Scraps ERP Project After $1 Billion Spent
US Authorities Start Extradition Process in Megaupload Case (March 5, 2012)
US banks hit by more than a week of cyberattacks
US blaming Iran for Persian Gulf cyberattacks
US CEO Says French Workers Have Three-Hour Work Day