(IN)SECURE Magazine |
SYNful Knock: Backdoor Malware Found in Cisco Routers |
"Certifi-Gate" Android Vulnerability Lets Hackers Take Complete Control of Your Device |
#opKKK Anonymous denied involvement in recent leak |
#OpNimr Anonymous targets Saudi websites to stop al-Nimr’s crucifixion |
#ParisAttacks — Anonymous declares War on ISIS: 'We will Hunt you Down!' |
(IN)SECURE Magazine issue 46 released |
(IN)SECURE Magazine issue 47 released |
(IN)SECURE Magazine issue 48 released |
.onion officially registered as special-use domain name by the IETF |
@FFD8FFDB Twitter bot spies on poorly configured cameras |
‘In Our Sites’ Operation seized 999 websites offering counterfeit goods |
‘Prohibition Era’ Of Security Research May Be Ahead |
‘Software Liability Is Inevitable’ |
0-days found in widely used Belkin router, fixes still unavailable |
0xHACKED: Brown University Accounts Distributing Phishing Emails |
1 in 4 organizations have experienced an APT |
10 tips to help organizations stay secure this holiday season |
10% of enterprises have at least one compromised device |
100,000 laptops and phones left in UK bars each year |
11 Million Ashley Madison Passwords Cracked In Just 10 Days |
11 zero-days uncovered in Samsung Galaxy S6 Edge |
13 million MacKeeper users exposed in data breach |
13 Million MacKeeper Users Hacked — 21 GB of Data Exposed |
130 Celebrities' Email Accounts Hacked; Hacker Stole Movie Scripts and Sex Tapes |
137 major incidents disrupted EU telephony and Internet access in 2014 |
15-year-old Boy Arrested in connection with TalkTalk Cyber Attack |
15-Year-Old has been identified and arrested for TalkTalk Attack |
18,000 Android Apps include SMS stealing Library |
191 Million US Voters' Personal Info Exposed by Misconfigured Database |
19-Year-Old Teen Steals $150,000 by Hacking into Airline's Website |
1-Click Way to Check If your Android Device is Vulnerable to Hacking |
200 Million WhatsApp Users Vulnerable to vCard Vulnerability |
200,000 Comcast login credentials available on the Dark Web |
2015 Cost of Cyber Crime Study |
2015 saw 888 data breaches, 246 million records compromised worldwide |
250+ iOS apps offered on Apple's App Store found slurping user data |
26 vulnerabilities found in parental monitoring application |
3 OEMs Vulnerable To 3 Vulnerabilities. Your PCs At Risk |
3G/4G cellural USB modems are full of critical security flaws, many 0-days |
3G/4G modems continue to be vulnerable |
3-in-1 solution for enterprise management of privileged accounts and info |
4 in 10 midsize businesses have experienced a data breach |
40% of companies expect a data breach next year |
49 new Regin backdoor modules discovered |
49 suspected members of cybercriminal group arrested in Europe |
5 Guidelines in Battling Cyber Criminals Over Precious Business Data |
5 reasons Security Congress is the (ISC)2 member event of the year |
5.6 Million Federal Employees' Fingerprints Stolen in OPM Hack |
5.6 Million Fingerprints Stolen In OPM Hack |
500 million users at risk of compromise via unpatched WinRAR bug |
6.4 billion connected things will be in use in 2016 |
600TB of data exposed due to misconfigured MongoDB instances |
63% in favor of encryption backdoors to respond to national security threats |
65,000+ Land Rovers recalled due to software bug |
7 key global DDoS trends revealed |
7 years of Android: A painful journey to world dominance |
70% of breaches are detected by a third-party |
74% organizations think they will be hit by an APT in the near future |
75% of companies experienced a fraud incident in the past year |
8 key online fraud behaviors and patterns |
81% of healthcare organizations have been compromised |
86% of PHP-based apps contain at least one XSS vulnerability |
86.2 million phone scam calls delivered each month in the U.S. |
87% of Android smartphones are insecure and that’s no joke |
88 percent of company networks vulnerable to privileged account hacks |
88% of Android devices vulnerable due to slow patch management |
90% of companies benefit from Big Data |
90% of directors believe regulators should hold firms liable for hacks |
90% of large businesses in the UK experienced data breach |
9271 crucial vulnerabilities found in 185 firmware images of embedded devices |
95% of websites in 10 new TLDs are suspicious |
A |
A billion Android devices vulnerable to Stagefright 2.0 bugs |
A few hours the Paris attacks, a new ISIS propaganda hub appeared on the Darknet |
A flaw in D-Link Switches opens corporate networks to hack |
A Fourth Teenager was arrested over TalkTalk data breach |
A fundamental shift in security spending |
A Jihadi Help Desk assists ISIS terrorists and sympathizers with encryption? |
A look at North Korea’s ‘paranoid’ Red Star OS computer operating system |
A new emergency patch for Adobe Flash Zero-Day, update your system! |
A new person is leaking confidential documents on the US drone wars |
A new, streamlined version of Cryptowall is doing rounds |
A secret cellphone spying devices catalog leaked online |
A serious issue in Steam allowed access to other users’ accounts |
A slew of LTE 4G vulnerabilities endanger Android users and mobile carriers |
A software bug caused the early release of 3,200 US prisoners |
A Step-by-Step Guide — How to Install Free SSL Certificate On Your Website |
A well-funded cyber criminal group targets Asian organizations |
A young hacker violated the CIA Director’s private AOL email |
Abysmal security practices by toy maker VTech result in massive data breach |
Access Private Photos and Contacts Without a Passcode on iOS 9 devices |
Account recovery via secret questions is a bad idea |
Actor using Angler exploit kit switched to Neutrino |
AdBlock Extension has been Sold to an 'Unknown Buyer' |
Adobe fixes dozens critical vulnerabilities in Flash Player |
Adobe Flash Update Includes Patches for 17 Vulnerabilities |
Adobe Hotfix Patches XXE Vulnerability in ColdFusion |
Adobe Patches 23 Critical Vulnerabilities in Flash Player |
Adobe Patches 69 Vulnerabilities in Reader, Acrobat, Flash |
Adobe patches Hacking Team Flash zero-days, update immediately! |
Adobe Patches Two Shockwave Player Vulnerabilities |
Adobe Patches XXE Vulnerability in LiveCycle Data Services |
Adobe Releases 23 Security Updates for Flash Player |
Adobe to Kill 'FLASH', but by Just Renaming it as 'Adobe Animate CC' |
Adobe to Patch Reader and Acrobat Next Week |
AdobeWorkgroupHelper 2.8.3.3 - Stack Based Buffer Overflow |
Advantech Clears Hard-Coded SSH Keys from EKI Switches |
Adware installer gives itself permission to access Mac users' keychain |
Aerospace Probes released to stratosphere for spying weapons |
Aethra botnet made up of 12000 Italian devices threatens businesses |
After two fixes, OAuth standard deemed secure |
Aggressive Android ransomware spreading in the USA |
Aggressive tactics from DD4BC extortionist group revealed |
AirDrop Bug in Apple iOS and OSX allows Hackers to Install Malware Silently |
Akamai and Trustwave unite to protect businesses from online threats |
ALERT: This New Ransomware Steals Passwords Before Encrypting Files |
AlienSpy RAT Resurfaces as JSocket |
AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1 |
All BBC Websites went down after a major DDoS attack |
Alleged LulzSec member claims responsibility for the DDoS on TalkTalk |
Allegedly 40 apps on App Store are infected |
Amazon Inspector Addresses Compliance and Security Challenge |
Amazon launches AWS web application firewall |
Amazon resets customers' potentially compromised passwords |
America’s Thrift Stores breached by Eastern European criminals |
An Amazon employee became owner of Google.com for a few minutes |
Analytics services are tracking users via Chrome extensions |
Analyzing Ransom32, the first JavaScript ransomware variant |
and the most sophisticated Android malware ever exposed |
Android 5 bug allows attackers to easily unlock password-protected devices |
Android adware tricks users into giving it power to secretly download other apps |
Android factory reset not enough to keep data secure |
Android ransomware gets new, professional look thanks to Google’s Material Design |
Android ransomware masquerades as Adult Player app, takes photo of victim |
Android smartphones |
Android Stagefright Exploit Code Released |
Android Stagefright Exploit Code Released to Public |
Android Tablets with Pre-loaded Cloudsota malware sold on Amazon |
Android users rejoice! Security updates will be coming out faster |
Angler EK exploits recently patched IE bug to deliver ransomware |
Angler exploit kit includes the code of a recent Flash flaw |
Anonymous Declares War On Donald Trump — #OpTrump |
Anonymous goes after ISIS, aims to expose recruiters and sympathizers |
Anonymous Group Leaks Identities of 1000 KKK Members |
Anonymous Hackers to Leak 1000 of KKK Members Details on Million Mask March (Nov 5, 2015) |
Anonymous Hacking Group Takes Down 20,000 ISIS Twitter accounts |
Anonymous has taken down 5,500 ISIS accounts |
Anonymous Took Down 20,000 pro-ISIS Twitter accounts |
Anonymous will reveal names of about 1,000 KKK members |
Another computer system at the Pentagon has been hacked |
Another ISIS Hacker Killed by U.S Drone Strike in Syria |
Another Magento Remote Code Execution Vulnerability |
Another root CA cert with key found on Dell's machines |
Another teenager arrested in connection to TalkTalk hack |
Anti-IS group ‘New World Hackers’ claims BBC website attack |
Antiquated environment and bad security practices aided OPM hackers |
API security becoming a CXO level concern |
Appeals Court Vacates Lower Court’s Decision on National Security Letters |
Apple Addresses Dozens of Vulnerabilities, Embraces Two-Factor Authentication in iOS 9 |
Apple App Store suffers its first large-scale attack |
Apple Boosts iOS 9 Security with improved Two-Factor Authentication |
Apple boots some ad blockers from App Store to protect users' privacy |
Apple complicates app sideloading in iOS 9 for increased security |
Apple confirms Judge unlock a new iPhone is not possible |
Apple fixes a bucketload of vulnerabilities in everything |
Apple fixes serious flaws in the Productivity Apps |
Apple Gatekeeper Bypass Opens Door for Malicious Code |
Apple Goes All-In on Privacy |
Apple has several apps from the official iOS App Store |
Apple iOS 9.0.2 Update Patches Lock Screen Bypass Exploit |
Apple iOS Jailbreak Tweaks Have Backdoors; 220,000 iCloud Accounts Hacked |
Apple Kicks Out some Malicious Ad-Blocker Apps from its Online Store |
Apple Mac OS X Hits by Two Unpatched Zero-day Flaws |
Apple Patches 100+ Vulnerabilities in OS X, Safari, iOS |
Apple Patches Critical OS X DYLD Flaw in Monster Update |
Apple patches serious remotely exploitable iTunes and App Store flaw |
Apple pushes out critical security updates for OS X, iOS, watchOS, and other products |
Apple releases OS X El Capitan, patches passcode loophole in iOS |
Apple releases security updates for every major product |
Apple Removes Apps That Expose Encrypted Traffic |
Apple removes hundreds of malicious apps after major malware attack |
Apple to Built Fuel Cell Battery that Could Power iPhones and Macbooks for Weeks |
Apple to Remove 256 iOS Apps Using Private APIs, Collecting Personal Data |
Apple told Judge: It's Impossible to Access Data on Locked iPhones |
Apple watchOS2 Includes Host of Code-Execution Patches |
Apple Zero Day Remains Unpatched |
Apple's Biggest Hack Ever: 4000 Malicious iOS Store Apps Linked to CIA? |
Apple's Swift programming language is now open source |
APT Group Gets Selective About Data it Steals |
Arabian tales by ‘Nigerians’ |
Are IT pros overconfident in their ability to deflect attacks? |
Are IT security pros optimistic or naïve? |
Are Russian hackers infecting critical infrastructure in Ukraine? |
Are we putting our finances at risk with our online shopping and banking? |
Are you ready for EMV? |
Are your competitors organizing DDoS attacks against you? |
Ashley Madison hacked, info of 37 million users stolen |
Ashley Madison Hacker – An Insider Woman Employee? |
Ashley Madison-themed blackmail, data deletion scams hitting inboxes |
Assassins in the darkweb, “Service catalogue” and Price list” updated |
AT&T Facilitated NSA Surveillance Efforts, Reports |
Attack code for critical Android Stagefright flaw published |
Attacker Compromised Mozilla Bug System, Stole Private Vulnerability Data |
Attackers actively exploiting Windows bug via malicious USB devices |
Attackers Can Use SAP to Bridge Corporate, Operational ICS Networks |
Attackers can use Siri, Google Now to secretly take over smartphones |
Attackers compromise Cisco Web VPNs to steal login credentials, backdoor target networks |
Attackers Embracing Steganography to Hide Communication |
Attackers hack into Outlook Web App (OWA) Server for access to organization network |
Attackers posing as legitimate insiders still an enormous security risk |
Attackers prefer lower-bandwidth DDoS attacks |
Attackers Replacing Firmware on Cisco Routers |
Attackers take over org's OWA server, harvest domain credentials with malicious DLL |
Attackers use Google Drive, Dropbox to breach companies |
Attacking Diffie-Hellman protocol implementation in the Angler Exploit Kit |
Authentication bypass flaw in Netgear SOHO routers exploited in the wild |
Authors digitally signed Spymel Trojan to evade detection |
AutoIt Used in Targeted Attacks to Move RATs |
AVG Antivirus Plans to Collect & Sell Your Personal Data to Advertisers |
AVG will sell user browsing and search info to advertisers |
AVG, McAfee, and Kaspersky antivirus were vulnerable to critical flaw |
AV-Test – Which is the best Antivirus for Linux systems? |
B |
Back to the Future: How much of Marty and Docs' tech is a reality? |
Backdoor In A Backdoor Identified in 600,000 Arris Modems |
Backdoor in Baidu Android SDK Puts 100 Million Devices at Risk |
BackStab Malware steals iOS and BlackBerry Backups |
Bad actors target entities worldwide via Cisco WebVPN |
Bad Santa! Microsoft Offers — 'Upgrade now' or 'Upgrade tonight' to Push Windows 10 |
BadBarcode: Poisoned barcodes can be used to take over systems |
Banking Malware Moving Over Facebook Hosted in Cloud |
Bartalex Variants Spotted Dropping Pony, Dyre Malware |
Beaches, carnivals and cybercrime: a look inside the Brazilian underground |
Behind the scenes at BruCON, a European hacker conference |
Belkin's N150 router sports multiple flaws, including default access credentials for telnet server |
Beware Coffee Lovers! StarBucks Exposed you to 3 Critical Vulnerabilities |
Beware fake LinkedIn profiles, threat actors are using them to hack you |
Beware of Apple-themed phishing emails threatening to limit your account |
Beware, connected ikettles can leak WiFi passwords |
Big Data investments on the rise |
Bitcoin Core Developers Quit Bitcoin Project to Launch a New Digital Currency |
Bitcoin Creator 'Satoshi Nakamoto' Unmasked! An Australian Man 'Craig Wright' identified... |
Bitcoin Extortionist Copycats on the Rise, Experts Say |
Bitglass granted patent on searchable cloud encryption |
BitTorrent clients can be made to participate in high-volume DoS attacks |
BitTorrent Fixes Reflective DDoS Attack Security Flaw |
Black Friday and Cyber Monday, Keep Yourself Safe |
Black marketplace – 50c buys login for stolen media accounts |
BlackEnergy targets Ukrainian news media and electric industry |
Blackhole Exploit Kit Resurfaces in the wild |
BLEKey Device Breaks RFID Physical Access Controls |
Blockchain transactions create risks for financial services |
Bogus PayPal App used to spread a banking Trojan |
Brain's reaction to certain words could replace passwords |
Breaches might be inevitable, but penalties are not harsh enough |
British Gas customers’ data posted online, 2,200 records exposed |
British Intelligence Agency Can Hack Any Smartphone With Just a Text Message |
British Intelligence Open-Sources its Large-Scale Graph Database Software |
British NCA revealed to have hacking abilities, aka equipment interference |
British-born ISIS Hacker Killed in US Drone Strike in Syria |
Brute-Force amplification attacks on WordPress rely on XML-RPC |
Bug hunting without much tech knowledge or many tools |
Bug in Android Gmail app allows effective email spoofing |
Bug in Gmail app for Android Allows anyone to Send Spoofed Emails |
Bug in OS X Yosemite allows attackers to gain root access |
Bugs in Drupal's update process could lead to backdoored updates, site compromise |
Bugzilla CVE-2015-4499 flaw, be aware hackers could know all your bugs |
Business email compromise scams still happening, still successful |
Business leaders increasingly drive cloud migration |
Businesses know about POS security risks, but are they investing wisely? |
Businesses Using Millions of insecure SHA-1 Certificates |
Bypass Developed for Microsoft Memory Protection, Control Flow Guard |
C |
Cadelle and Chafer, Iranian hackers are tracking dissidents and activists |
Can an inevitable evil be conquered? |
Can organizations hold back the tide of cloud adoption? |
Canceled Talk Re-Ignites Controversy Over Legitimate Security Research |
Car Hacking Gets the Attention of Detroit and Washington |
Car hacking via compromised car diagnostic tools |
Carbanak gang is back and packing new guns |
Card Breach at Hilton Hotel Properties Under Investigation |
Caution! Hackers Can Easily Hijack Popular Baby Monitors to Watch Your Kids |
CDNetworks to showcase Cloud Security 2.0 at Black Hat USA 2015 |
Census Bureau Says Breach Didn’t Compromise Sensitive Data |
Central Shop, the evolution of credit card black markets |
CERT Warns of Hard-Coded Credentials in DSL SOHO Routers |
CERT Warns of Slew of Bugs in Belkin N600 Routers |
CFOs are not confident about their level of security |
CIOs agree, IT is more complex than ever |
CISA Passes Senate, criticism about privacy and security |
Cisco finds, removes more default SSH keys on its software |
Cisco Fixes DoS Vulnerability in ASR 1000 Routers |
Cisco Jabber flaw allows MitM attackers to wiretap communications |
Cisco Patches Denial-of-Service, Bypass Vulnerabilities in IOS |
Cisco Patches File Overwrite Bug in IMC Supervisor and UCS Director |
Cisco released a tool to scan for SYNful_Knock implants |
Cisco squashes DoS bug in its unified infrastructure software |
Cisco Systems will be auditing their code for backdoors |
Cisco Takes Down Ransomware Operation Generating $30 Million in Revenue For Hackers |
Cisco Warns Customers About Attacks Installing Malicious IOS Bootstrap Images |
CISO at U.S. Bank offers tips for secure online purchasing |
CISOs are looking for more integration and automation |
Citovat Wassenaar, HP vytáhne z Mobile Pwn2Own |
Civil nuclear facilities worldwide at risk of cyber attack |
Class Action Suit Against Neiman Marcus Over Data Breach Revived |
Clever Android ransomware infects tens of thousands of devices |
Click-Malware Podvod Šíření přes JavaScript Přílohy |
Cloud encryption and tokenization trends in financial services |
Cloud-based solutions that protect against zero day attacks |
Cloud-based vulnerability management: Top vendors in the field |
Code Signing certificates becoming popular cybercrime commodity |
Coinvault, are we reaching the end of the nightmare? |
Collision Attack: Widely Used SHA-1 Hash Algorithm Needs to Die Immediately |
Comcast resets passwords for 200,000 users after login credentials go on sale |
Commercial code is more compliant to security standards than open source code |
Comodo Issues Eight Forbidden Certificates |
Companies investing in cloud, security and Big Data are growing faster |
Companies leave vulnerabilities unpatched for up to 120 days |
Companies still lack security controls for accessing enterprise applications |
Complex security solutions are exposing companies to risk |
Compliance vs. cybersecurity: Insurers face competing priorities |
Compromising Macs with simple Gatekeeper bypass |
Confidence in antivirus falls to all-time low |
Confusion about IT security leaves devices at risk |
Confusion regarding strategic defenses for network security |
Consumers expect businesses to be more transparent on how their data is used |
Consumers increasingly adopting personal security measures |
Container security concerns escalate |
Cops are turning to privately held DNA databases for info to help with investigations |
Core Infrastructure Initiative Launches Open Source Security Badge Program |
CoreBot Adds New Capabilities, Transitions to Banking Trojan |
CoreBot Malware Steals Credentials-For Now |
Corporate networks can be compromised via Windows Updates |
Cost of Breaking SHA-1 decreases due to a new Collision Attack |
Cox Communications to pay $595,000 for data breach |
Cracka hackers doxed more than 2,000 Government employees |
Cracka hackers who doxed CIA Chief, not hit the FBI Deputy Director |
Cracking WiFi Passwords By Hacking into Smart Kettles |
Cracks in the mobile ecosystem, Internet-connected devices |
Credential manager system used by Cisco, IBM, F5 has been breached |
Criminals behind CryptoWall 3.0 Made $325 Million |
Criminals hacked chip-and-PIN system by perfecting researchers' PoC attack |
Criminals, Linguistics, Literacy and Attribution |
Critical Bugzilla flaw allows access to unpatched vulnerability information |
Critical Flaws Found in Network Management Systems |
Critical Java Bug Extends to Oracle, IBM Middleware |
Critical Joomla RCE bug actively exploited, patch immediately! |
Critical Netgear Router Exploit allows anyone to Hack You Remotely |
Critical 'Port Fail' Vulnerability Reveals Real IP Addresses of VPN Users |
Critical RCE bug in FireEye's security appliances exploitable via email |
Critical RubyGems vulns can lead to installation of malicious apps |
Critical ScreenOS bugs allow undetectable decryption of VPN connections, device hijacking |
Critical vulnerabilities found in Honeywell Midas Gas Detectors |
Crooks are abusing Google Search Console to remain under the radar |
Crooks stole €600,000 in MitM attacks on EMV Cards |
Crooks use the Nuclear Exploit Kit to serve CryptoWall 4.0 |
Cross-device tracking via imperceptible audio beacons threatens user privacy |
Crypto e-mail provider ProtonMail pays ransom to stop DDoS attack, attack continues |
Crypto-ransomware encrypts files "offline" |
Cryptowall 4.0 comes from Russia, Bitdefender released a vaccine |
CryptoWall 4.0 Released with a New Look and Several New Features |
CryptoWall Ransomware raised $325 Million in Revenue for Its Developer |
CSA releases tool for personal data legal protection |
CSRF Flaw Patched in Popular Spring Social Core Library |
CUJO: Plug-n-play protection for all devices |
Curbing the For-Profit Cybercrime Food Chain |
Custom Google App Engine Tweak Still Leads to Java Sandbox Escapes |
Custom secure apps are gaining popularity in the enterprise |
Customers of Japanese banks targeted by the Brolux Trojan |
CVE-2015-8562 – 16,000 Daily Attacks on vulnerable Joomla servers |
Cyber attack grounds Polish LOT aeroplanes |
Cyber attack on US power grid could result in losses up to $1 trillion |
Cyber attack overall cost suffered last year by businesses is $315b |
Cyber Caliphate Hacks 54k Twitter accounts, including ones of CIA and FBI officials |
Cyber crooks abuse legitimate EU Cookie Law notices in clever clickjacking campaign |
Cyber crooks actively hijacking servers with unpatched vBulletin installations |
Cyber crooks opt for APT method for delivering malware |
Cyber insurance market to hit US$10 billion by 2020 |
Cyber liability insurance is becoming an increasing necessity |
Cyber risk still poorly communicated to C-suite executives |
Cyber security guidelines for the shipping industry |
Cyber spies of the Sofacy APT increased its operations tenfold |
Cyber Terrorists Can Get Their Hands on UK Infrastructure, Like the Net or Electricity |
Cyber warfare fears spur US Navy to teach celestial navigation again |
Cyberattacks will cost U.S. health systems $305 billion |
Cybercriminals are becoming more creative |
Cybercriminals are preying on existing vulnerabilities to plan future attacks |
Cybercriminals increasingly hunting down the money |
Cybercriminals to target new payment technologies |
Cyberespionage group exploits satellites for ultimate anonymity |
Cybersecurity expectations: Myth and reality |
Cybersecurity is being taken seriously around the globe |
Cybersecurity strategies and the boardroom |
CyberSpace — China arrested Hackers at U.S. Government Request |
Cyberspace Global Warming as a duality of Trajectories on cyberpolitics |
D |
Damballa revealed the secrets behind the Destover malware that infected the Sony Pictures |
Darkhotel APT Latest to Use Hacking Team Zero Day |
Darkhotel spying crew boosts attacks with Hacking Team exploit |
Darkode forum returns with lousy security that keeps serious users away |
Darkode forum was supposed to be resuscitated, but … |
Darkweb, a look back at 2015 events and 2016 predictions |
DARPA is working on ICARUS, the disappearing delivery drone |
DARPA Protecting Software From Reverse Engineering Through Obfuscation |
Data Breach Day — Patreon (2.3M), T-Mobile (15M) and Scottrade (4.6M) — HACKED! |
Data breaches and bots are driving cybercrime surge |
Data breaches, stolen data and their sale in the Dark Web |
Data dump points to a breach at Electronic Arts |
Data of 34,000 Steam users exposed due to buggy caching configuration |
Database of 70 million prisoner phone calls breached, leaked |
Database with 191 Million US voters’ personal data exposed online |
Dating scam package offered in the underground |
DDoS attack on BBC may have reached 602Gbps, never so powerful |
DDoS attacks increase 180% compared to a year ago |
Deadly Simple Exploit Bypasses Apple Gatekeeper Security to Install Malicious Apps |
Deadly Windows, Reader font bugs can lead to full system compromise |
De-anonymizing code authors by analyzing executable binaries |
Deleting WhatsApp Messages Before 90 Days Could Land you in Jail |
Dell puts users at risk with dangerous eDellRoot root certificate |
Dell shipped computers with root CA cert, private crypto key included |
Dell's Laptops are Infected with 'Superfish-Like' pre-installed Malware |
Demand for new malicious programs reaches saturation point |
Dennis Fisher On Security, Journalism, and the Origins of Threatpost |
Deplorable Steam security flaw exploited to hijack prominent accounts |
Design Flaws Make Drones Vulnerable to Cyber-Attacks |
Details Surface on Patched Bugzilla Privilege Escalation Flaw |
Details Surface on Patched Sandbox Violation Vulnerability in iOS |
DHS Information Security Program, Dozens secret databases vulnerable to hack |
DHS Raises Privacy Concerns With Senate Cyber Threat Sharing Bill |
DHS working on ‘self-destructing’ security chip for smartphones |
DHS: Drug Traffickers are hacking surveillance drones on the border |
Did FBI pay the Carnegie Mellon to hack Tor? |
Did terrorists use PlayStation 4 for communications in Paris attacks? |
Digitally signed spam campaign spotted delivering malware |
Disbanding the ‘Zoo’ |
Disclosed Netgear Router Vulnerability Under Attack |
Discovered a new DB containing more than 56 million records of US Voters |
Discovered an ISIL Bitcoin Address containing 3 Million dollars |
Disgusting! Ashley Madison was Building an App – 'What's your Wife Worth?' |
Distrust in use of personal data could hinder business growth |
D-Link accidentally leaks code-signing certs in its firmware |
D-Link Accidentally Leaks Private Code-Signing Keys |
D-Link Accidentally Publishes Its Private Code-Signing Keys on the Internet |
Dmail: A Chrome extension for sending self-destructing emails |
Do CEOs know enough about cyber security? |
Do CISOs deserve a seat at the leadership table? |
Do conventional security measures negatively impact productivity? |
Do security flaws with life-threatening implications need alternative disclosure? |
Do we need harsher penalties and enforced data breach detection measures? |
Documents demonstrate NSA continued mass surveillance |
Does Mr. Robot’s use real Hacking Tools? Which are? |
Don’t throw away your old Boarding Pass, it may contain personal information |
Dow Jones & Company Latest Financial Firm Hit With Data Breach |
Dridex Banking Malware Back in Circulation |
Dridex Botnets are still active and effective |
Drupal moves to fix flaws in update process |
Dutch Police Arrest Alleged CoinVault Ransomware Authors |
Duuzer Trojan: A New Backdoor Targeting South Korean Organizations |
Duuzer, a data stealer Trojan targets South Korean organizations |
Dyreza Trojan Targeting IT Supply Chain Credentials |
E |
Easily exploitable Certifi-gate bug opens Android devices to hijacking |
eBay Fixes XSS Flaw in Subdomain |
eBook: 5 Essential Steps to PCI DSS Compliance |
eBook: Cybersecurity for Dummies |
eBook: Fighting Known, Unknown, and Advanced Threats |
eBook: Website Security for Dummies |
Edward Snowden to discuss privacy at IP EXPO Europe 2015 |
eFast browser deletes and replaces your Chrome Browser |
EFF delves into privacy practices of Apple, Google, Twitter, and others |
EFF Scoreboard – Secure Messaging, stay safe online |
EFF, AdBlock and Others Launch New Do Not Track Standard |
EFF: T-Mobile breaks neutrality rules with Binge On service |
EFF's Privacy Badger prevents users being tracked online |
Elasticsearch servers actively targeted by botmasters |
Email accounts belonging to 130 Celebrities have been Hacked |
Email is more secure today than it was two years ago |
Embedded Devices Share, Reuse Private SSH Keys, HTTPs Certificates |
EMEA organizations are being pre-emptive about security |
Emergency Flash update plugs zero-day exploited in the wild |
Emergency IE Patch Fixes Vulnerability Under Attack |
Emergency Patch released for Latest Flash Zero-Day Vulnerability |
Employee credentials of half of European top 500 firms exposed online |
Employee Stole 'Yandex Search Engine' Source Code, Tried to Sell it for Just $29K |
Employee use of cloud services puts business data at risk |
Encrypted Email Servers Seized by German Authorities After School Bomb Threats |
Encryption, Lock Mechanism Vulnerabilities Plague AppLock |
Endpoint security lags in spite of vulnerabilities |
Endress+Hauser Patches Buffer Overflow In Dozens of ICS Products |
End-to-end encrypted database ZeroDB is now open source |
Energy security pros: More competent, or just naive? |
Enhanced security for corporate information on mobile devices |
Entrust Datacard integrates with Citrix to enable secure anytime-anywhere productivity |
EPIC Fail — For the Third Time, Linux Ransomware CRACKED! |
Espionage campaign relying on the Zeus Trojan targets the Israeli Public Sector |
EU plans to ban Bitcoin to curb terrorism funding |
EU regulation to Impose rules on firms to improve cybersecurity |
European Aviation Agency Warns of Aircraft Hacking |
European Aviation Safety Agency – Airplane hacking is reality |
European credit card payment terminals are plagued with serious flaws |
European data centre services provider Interxion suffers breach |
European Parliament members want member states to protect Edward Snowden |
European Police Agencies declare war on DroidJack RAT |
European Space Agency domains hacked by Anonymous |
Europe's new "net neutrality" regulation is full of loopholes |
Evaluating the security of open source software |
Every Call You Make or Text You Send, They'll Be Tracking From Today |
Exabeam secures $25 million in Series B funding |
Existing security standards do not sufficiently address IoT |
Expedia users targeted by phisher who gained access to their info |
Experian Breach Spills Data on 15 Million T-Mobile Customers |
Experian Breach: 15 Million T-Mobile Customers' Data Hacked |
Experian’s data breach puts 15 million T-Mobile users at risk |
Experts discovered the attack platform used by the Winnti Group |
Exploit broker offers $1 million for reliable iOS 9 exploit |
Exploit kit activity up 75 percent |
Exploit Writing and Mitigation Going Hand in Hand |
Exploiting Browser Cookies to Bypass HTTPS and Steal Private Information |
Exploring the North American cybercriminal underground |
Exposing cyberattacks targeting government networks in Southeast Asia |
Exposing fraud behavior patterns associated with compromised identities |
EZCast TV streaming stick leaves home networks vulnerable to attack |
F |
Facebook Awards $100,000 for New Class of Vulnerabilities and Detection Tool |
Facebook first discovered spear phishing attacks of Iranian hackers on State Department employees |
Facebook introduces end-to-end encryption for notifications |
Facebook is testing Self-Destructing Messages for Messenger App |
Facebook M: Facebook's Answer to Siri, Cortana and Google Now |
Facebook slowly fine-tuning its popular ThreatExchange |
Facebook starts warning users of state-sponsored attacks against their accounts |
Facebook to Launch Its Own Satellite to Beam Free Internet |
Facebook tries to help advertisers and users with new ad control options |
Facebook Updates Information-Sharing Platform |
Facebook Will Now Notify You If NSA is Spying on You |
Facebook wins Flash by knock out by switching to HTML5! |
Facebook. Beware state-sponsored hackers are trying to hack you! |
Factors that influence breach costs |
FAKBEN Ransomware-as-a-service emerges from the underground |
Fake "account verification" email targeting Alibaba.com users |
Fake recruiters on LinkedIn are targeting infosec pros |
Fake Twitter verification profiles trick victims into sharing personal, payment card info |
Fareit malware avoids detection using a different file hash for each attack |
FBI denies paying $1 MILLION to Unmask Tor Users |
FBI Deputy Director's Email Hacked by Teenager Who Hacked CIA Chief |
FBI Director Asks Tech Companies to At least Don't Offer End-to-End Encryption |
FBI director insists Silicon Valley can solve the encryption dilemma - if they try hard enough |
FBI is hunting MrGrey who has stolen 1.2 BILLION login credentials |
FBI reportedly Paid $1 Million to University Researchers for UnMasking Tor Users |
FBI Suggests Ransomware Victims — 'Just Pay the Ransom Money' |
FBI Warns of Increase in DDoS Extortion Scams |
FBI Warns Public Officials of Doxing Threat |
FBI warns Time Warner Cable of potential data breach |
FBI: Social Engineering, Hacks Lead to Millions Lost to Wire Fraud |
FBI’s Cyber Task Force Identifies Stealthy FF-RATs used in Cyber Attack |
Feasible ‘Going Dark’ Crypto Solution Nowhere to be Found |
Federal CISOs Propose New Efforts to Shore Up Cybersecurity |
Federálové Change Policy vyžadovat rozkaz k použití Stingrays |
Fewer IPsec VPN Connections at Risk from Weak Diffie-Hellman |
File insecurity: the final data leakage frontier |
File-stealing Firefox bug exploited in the wild, patch immediately! |
FIN5 hacking crew steals 150,000 credit cards from casino |
Final rule implements the Executive Order 13694. US can apply economic sanctions in response to cyber attacks |
Final TalkTalk breach tally: 4% of customers affected |
Finally! A free, open source, on-premise virus scanner framework |
Finance organizations risk data by failing to secure unique employee logins |
Finance teams becoming involved in cyber risk mitigation oversight |
Financial impact of SaaS storage breaches now $13.85 million |
Financial Reporting Council of Nigeria site used for phishing scam |
FireEye Appliances affected by a critical flaw simply exploitable |
FireEye legally censors crucial parts of a researcher's talk at 44CON |
Firefox 40: New features and critical security updates |
Firefox 41 integrates Free Built-in Instant Messaging and Video Chat to Your Browser |
Firefox 42 is out, with many privacy and security improvements |
Firefox blocks Flash plugin by default until zero-days are fixed |
Firewalls for SMBs that chew through encrypted streams |
FIRST announces CVSS version 3 |
First Ever Anti-Drone Weapon that Shoots Down UAVs with Radio Waves |
First ever EU rules on cybersecurity |
First Let’s Encrypt Free Certificate Goes Live |
Fitbit trackers can be infected with a malware in just 10 seconds |
Fitbit, warranty fraud, and hijacked accounts |
Five key cybersecurity trends for 2016 |
Five major Big Data predictions for 2016 |
Five points of failure in recovering from an attack |
Five principal cloud security challenges |
Five years of hardware and software threat evolution |
Flash 0-day exploit found in Hacking Team's leaked data exploited by criminals |
Flash Player 0-day exploited in the wild, patch immediately! |
Flaw allows hijacking of professional surveillance AirLive cameras |
Flaw in Comcast's home security system lets burglars in without triggering alarm |
Flaw in Linux.Encoder1 ransomware reveals the decryption key |
Flaw in the Android Gmail app opens to email spoofing attacks |
Flaws in ATMs of a German Bank open the doors to cyber attacks |
Flaws in industrial gas detectors exploitable by low-skilled attackers |
Flaws in medical data management system can be exploited to modify patient information |
For Better Privacy & Security, Change these iOS 9 Settings Immediately |
Former Employee tried to sell Yandex Source Code for Just $29K |
Former journalist faces 25 years in prison for article defacement |
Four critical Android bugs patched, one could lead to permanent device compromise |
Four essential tips that you can use to stay safe when you travel |
Four Zero Days Disclosed in Internet Explorer Mobile |
Fourth, a 16-year-old Hacker, Arrested over TalkTalk Hack |
Fragmented approaches to PKI don't always follow best practices |
France wants to BAN Tor and Free Wi-Fi Services after Paris Terror Attacks |
France will not Ban Public Wi-Fi Or Tor Network, Prime Minister Valls Confirms |
Fraudsters steal nearly $47 million from Ubiquiti Networks |
Free PCI and NIST compliant SSL test |
Free Ransomware Decryption Tool — CoinVault and Bitcryptor |
Free tool helps organizations respond to vulnerability reports |
Free Web Hosting 000Webhost hacked, 13 Million users impacted |
Free WordPress plugin for a password-free login |
French activist accuses Anonymous #OpParis of hindering Law Enforcement |
FTC amends telemarketing rule to ban payment methods used by scammers |
FTC, Experts Push Startups to Think About Security From the Beginning |
Future attacks: Hiding exploit code in images |
G |
GameOver Zeus gang boss also engaged in cyber espionage |
Gary McGraw on Scalable Software Security and Medical Device Securityf |
Gaza cybergang, where’s your IR team? |
General Motors invites hackers to report security flaws in their cars |
German Government Audits TrueCrypt |
German Spy-Agency Trades Citizens' Metadata in Exchange for NSA's Xkeyscore |
Germany probes alleged new case of US espionage: Regin malware infected Gov laptop |
Germany's new cyber-security law aimed at securing critical infrastructure |
Getting BYOD right |
GCHQ accused of illegal Computer Network Exploitation activities |
GCHQ and NCA hunting criminals in the dark web |
GCHQ Gaffer database goes open source |
GCHQ open sources Gaffer, a data collection and mining framework |
Gift cards and return merchandise fraud scheme |
Github Mitigates DDoS Attack |
GlassRAT, the threat that remained stealth for years |
Global action takes down Darkode cybercriminal forum |
Global cyber insurance market to grow to over $20 billion by 2025 |
Global cyberconflicts, hacktivism and disruptions are on the horizon |
Global hacker competition challenges penetration testers |
Global information security spend grows by 5% in 2015 |
Global Internet experts reveal plan for more secure, reliable Wi-Fi routers |
Global managed security services market to reach $29.9 billion by 2020 |
GnuPG 2.1.9 released |
Gone in Less Than a Second |
Google adds another obstacle for developers of deceptive Chrome extensions |
Google 'Android N' Will Not Use Oracle's Java APIs |
Google announces reward program for Android bugs |
Google debuts customized warning for social engineering sites |
Google Details Plans to Disable SSLv3 and RC4 |
Google Drive security boost for paying customers |
Google hacker Forshaw’ verdict about Windows 10 |
Google helps Adobe improve Flash security |
Google Helps Lead Effort Against Automated Traffic From Data Centers |
Google Chrome update includes 43 security fixes |
Google is Merging its Chrome OS with Android |
Google is testing password-free logins |
Google Makes Full-Disk Encryption Mandatory for New Android 6.0 Devices |
Google Moving Gmail to Strict DMARC Implementation |
Google Patches Critical Vulnerabilities in Chrome 45 |
Google Patches Latest Android Lockscreen Bypass |
Google patches Stagefright 2.0 on Nexus devices |
Google Plans Monthly Security Updates for Nexus Phones |
Google Play Store increases Android APK Size Limit from 50MB to 100MB |
Google plugs Google Admin app sandbox bypass 0-day |
Google Project Zero Turns Over 11 Bugs in Galaxy S6 Edge |
Google Pushes Stagefright 2.0 Patches to Nexus Devices |
Google records and maintains all our voice searches |
Google releases new hub for managing security and privacy settings |
Google releases Security Patch for Android Stagefright 2.0 Vulnerability |
Google researcher finds critical flaws in Trend Micro AV solution |
Google Safe Browsing to start blocking sites with ads leading to unwanted software |
Google Secretly Records Your Voice — Here's How to Listen and Delete It |
Google to Disable Weak SSLv3 and RC4 Protocols to Boost Internet Security |
Google to Pause Flash Ads in Chrome Starting Next Week |
Google to Warn Recipients of Unencrypted Gmail Messages |
Google will switch from Java APIs to OpenJDK |
Google, Mozilla, Microsoft to Sever RC4 Support in Early 2016 |
Google’s $85 Chromebit Lets You Turn Any Monitor or TV into a Computer |
Google's Android Stagefright patch is flawed |
Government Asks for Security Community’s Help on Technical Issues |
Government Could Hack Children's Toys to Spy on You |
Government Releases Policy on Vulnerability Discovery and Disclosure |
GovRAT, the malware-signing-as-a-service platform in the underground |
GPS faker software broadcasts spam across thousands of fake profiles |
Granick: Dream of Internet Freedom ‘Dying’ |
GreenDispenser, is the last ATM Malware in the wild |
Group using DDoS attacks to extort business gets hit by European law enforcement |
Guide to application whitelisting |
Guidelines for smart city technology adoption |
H |
Hacker Buba is asking UAE bank for $3 million ransom |
Hacker Claims He helped FBI Track Down ISIS Hacker (Who was killed in Drone-Strike) |
Hacker claims Sony PlayStation 4 Jailbreak |
Hacker Confirms PlayStation 4 Jailbreak! Exploit Could Open Doors for Pirated Games |
Hacker Demonstrated Untethered iOS 9 Jailbreak On Video |
Hacker Finds a Simple Way to Bypass Android 5.x Lock Screen [Steps & Video] |
Hacker had access to sensitive info about Firefox bugs for over a year |
Hacker leaks sensitive info of millions of Adult FriendFinder users |
Hacker steals Bitdefender customer info, blackmails company |
Hacker-Friendly Search Engine that Lists Every Internet-Connected Device |
Hackers are exploiting Magento flaw to steal payment card info |
Hackers are exploiting zero-day flaw in fully patched Adobe Flash |
Hackers are spending a huge amount of resources targeting financial services |
Hackers are using Nuclear Exploit Kit to Spread Cryptowall 4.0 Ransomware |
Hackers Backdooring Cisco WebVPN To Steal Customers’ Passwords |
Hackers behind Dark Seoul are back |
Hackers breach firm whose tech is used in Samsung Pay |
Hackers Can Remotely Record and Listen Calls from Your Samsung Galaxy Phones |
Hackers can tamper with medical drug pumps, leading to fatal outcomes |
Hackers cause power outage with malware in Ukraine. Is it an Information warfare act? |
Hackers Cause World's First Power Outage with Malware |
Hackers claim ISIS Militants linked to Paris Attacks had a Bitcoin Wallet worth $3 Million |
Hackers Exploit Free SSL Certs from Let's Encrypt to Spread Malware |
Hackers Find A Way To Disable Car Airbags System |
Hackers have accessed details of 1,827 Vodafone customers |
Hackers have Hacked into US Arrest Records Database |
Hackers hit UCLA Health, access medical files of 4.5 million patients |
Hackers in the wild attempt to exploit the Juniper Backdoor |
Hackers Plan to Ruin Christmas Eve for Millions of PlayStation and Xbox Live Gamers |
Hackers put up for sale 13 million plaintext passwords stolen from 000webhost |
Hackers stole personal info of over a million of Japanese pensioners |
Hackers trace ISIS Twitter accounts back to the UK govt |
Hackers WIN $1 Million Bounty for Remotely Hacking latest iOS 9 iPhone |
Hack-Fueled ‘Unprecedented’ Insider Trading Ring Nets $100M |
Hacking CCTV Cameras to Launch DDoS Attacks |
Hacking discipline, EOL of computer science in the cyber domain |
Hacking enterprise wireless Printers with a drone or a vacuum cleaner |
Hacking Team hacked, 400GB+ of company documents and emails leaked |
Hacking Team Offering Encryption Cracking Tools to Law Enforcement Agencies |
Hacking Team pitches encryption-cracking tools to US law enforcement |
Hacking Team scrambling to limit damage brought on by explosive data leak |
Hacking Team's Flash 0-day exploit used against Korean targets before it was leaked |
Hacktivists and cyber extortionists hit Greek, Russian, UAE banks |
Half of iPhones on corporate networks run outdated iOS versions |
Hard-hitting insights into global attacks targeting organizations |
Hardware encryption market revenue to reach $36.4 billion by end of 2015 |
Hashcat, the fastest Password Cracking utility is now Open Source |
Health Insurer Excellus Hacked; 10.5 Million Records Breached |
Health records of 5.5 million US patients accessed in MIE breach |
Healthcare industry sees 340% more security incidents than the average industry |
Here's How SIEM Can Protect Your Privileged Accounts in the Enterprise |
Here's How to Stop Windows 7 or 8 from Downloading Windows 10 Automatically |
Here's How Websites Are Tracking You Online |
Hey ISIS! Check Out How 'Idiot' Anonymous Hackers Can Disrupt your Online Propaganda |
Hidden Data Economy Report Exposes Price Points for Stolen Data |
High prevalence of personal health information at risk |
High severity Internet Explorer 11 vulnerability identified after Hacking Team breach |
High school Student Hacked Into CIA Director's Personal Email Account |
High-impact DoS flaw patched in Node.js, update as soon as possible |
High-Risk SAP HANA Vulnerabilities Patched |
Hilton confirms some payment systems infected by malware |
Holes Patched in Online Bookmarking App Pocket |
Hope is not a strategy, we need more healthy paranoia |
Hospitals advised to stop using vulnerable computerized drug pumps |
Hotel Chain Hilton Worldwide Investigating Potential POS Breach |
How A Drone Can Infiltrate Your Network by Hovering Outside the Building |
How Amazon Employee bought 'Google.com' Domain for Only $12 from Google |
How are businesses responding to cyber risks? |
How attackers attempt to infect organizations |
How BitTorrent activity impacts security ratings |
How boards calibrate strategy and risk |
How businesses interpret and use threat intelligence |
How can we decide on surveillance and privacy when we can't see the whole picture? |
How CoinVault or Bitcryptor victims could try to recover their files |
How companies can regain consumer trust after a data breach |
How complex attacks drive the IT security innovation race |
How do you ensure success with DevOps? |
How does the ISIS control the Internet? |
How engaged is the average board when it comes to security? |
How experts stay safe online and what non-experts can learn from them |
How fake users are impacting business through acts of fraud and theft |
How gamers can help improve critical software security |
How Hackers Can Hack Your Chip-and-PIN Credit Cards |
How lack of trust and limited knowledge impact your organization |
How many employees present a cloud security risk? |
How NSA successfully Broke Trillions of Encrypted Connections |
How online fraud will evolve in 2016 |
How organizations can increase trust and resilience |
How Some Chinese Hackers Started Making Big Money |
How The Russian Abused Twitter as C&C in Hammertoss Malware? Python Answers |
How the threat landscape will change by 2020 |
How to Activate GodMode in Windows 10 |
How to Auto-BackUp Your WhatsApp Data to Google Drive with Encryption |
How to avoid data breaches? Start by addressing human error |
How to become a nightmare for cyber attackers |
How to become an Information Security Expert with the CISSP Certification |
How to Build a Successful Incident Response Plan |
How to Crash Your Friends' WhatsApp Just By Sending Crazy Smileys |
How to Detect IE Zero-day Exploit Used to Deploy Korplug Malware |
How to extract PIN from any selfie, is biometrics secure? |
How to find a free, secure proxy service? |
How to Fix Chrome Massive Memory Usage? Simply Try 'Chrome 45' for Faster Performance |
How to hack airbag in Audi TT on other models |
How to Hack and Decrypt WhatsApp Database on rooted devices |
How to hide from surveillance cameras: the past and the future |
How to improve Internet security after the disclosure of the Diffie-Hellman flaw |
How to Install Android 6.0 Marshmallow and When will Your Smartphone Get it? |
How to protect your privacy on Windows 10 |
How to Protect Yourself against XcodeGhost like iOS Malware Attacks |
How to Root Windows Phone and Unlock the Bootloader to Install Custom ROMs |
How to Run Multiple Android apps on Windows and Mac OS X Simultaneously |
How to silently control a mobile phone from 16 Feet Away |
How to steal Jaguar XFR cars in 60 seconds by hacking them |
How to survive a compliance audit |
How to Turn Any Non-Touch Screen PC Into a Touch Screen |
How to turn on two-factor authentication on over 100 popular online services |
How to use GCAT backdoor with Gmail as a C&C server |
How To Use WhatsApp Web Client on iPhone and Other iOS Devices |
How trustworthy are the world's leading websites? |
How UK businesses plan to tackle security threats in 2016 |
How you can anonymously use public Wi-Fi from miles afar |
HP releases exploit code for IE zero-day that Microsoft won't patch |
HTC phone stores fingerprints in easily accessible plaintext |
HTML5 Security Cheat Sheet |
HTTP error code 451 will signal online censorship |
HTTPS Available as Opt-In for Blogspot |
HTTPS Bicycle attack reveals password length, allows easier brute-forcing |
Huawei 3G routers rife with flaws |
Huge Flash Update Patches More Than 30 Vulnerabilities |
Human behaviour still the biggest threat to company security |
Human error reduces security offered by encryption apps |
Hundreds of thousands of engine immobilizers remotely hackable |
Hyatt Hotel Says Payment Systems Hacked with Credit-Card Stealing Malware |
Chakra JavaScript Engine: Microsoft Open-Sources the Heart of Edge browser |
Charlie Miller to Leave Twitter Security Team |
Check out data-centric security solutions at Infosecurity Europe |
Check out the Windows 10 security features |
Cherry Picker, a PoS Malware even more threatening |
Chikdos cross-platform DDoS botnet hit SQL servers worldwide |
Chimera, a new strain of ransomware in the wild |
China — OPM Hack was not State-Sponsored; Blames Chinese Criminal Gangs |
China APT Gang Targets Hong Kong Media via Dropbox |
China arrested hackers responding to a US Government request |
China arrested hackers suspected of OPM hack |
China blamed for cyber attack on Bureau of Meteorology computer |
China is the top target for DDoS reflection attacks |
China Passes Anti-Terrorism Law; Here's What You Need to Know |
China passes its first Anti-Terrorism law |
China spies on airline passengers with IMSI-catchers |
Chinese fraudsters are hijacking and misusing Uber accounts |
Chinese hackers arrested at US request |
Chinese Hackers Breached LoopPay for cyber espionage through Samsung Pay |
Chinese hackers target Taiwanese Opposition Party and media |
Chinese Hackers tried to Take Down Tibetan Social Networking Website |
Chinese Mobile Ad Library Backdoored to Spy on iOS Devices |
Chip-and-PIN Credit Cards and The Deadline: Here's What You need To Know |
Chrome exploit leaves million Android devices open to attack |
Chrome extension thwarts user profiling based on typing behavior |
Chrome extensions easily disabled without user interaction |
Chrome Zero-day Exploit leaves MILLIONS of Android devices vulnerable to Remote Hacking |
I |
I am HDRoot! Part 1 |
IBM cloud tool enables privacy-preserving user authentication |
Identify and track sensitive corporate data in real-time |
Imperfect algorithms threaten democracy |
In Wake of Cyberattacks, U.S. Readies Sanctions Against China |
Incredible! Someone Just Hacked 10,000 Routers to Make them More Secure |
India temporarily Bans Facebook's Free Internet Service |
Indicators of compromise as a way to reduce risk |
Industrial security awareness continues to remain low |
Info of 2.4 million Carphone Warehouse customers stolen |
Infographic: Devaluing data, fighting cybercrime |
Information security and privacy are crucial for EU growth |
Information security governance practices are maturing |
Information security: A key issue in the 2016 U.S. presidential campaign? |
Infosec pros are moving beyond traditional passwords |
Infosec pros have little confidence in UK's cybersecurity readiness |
Infosecurity Europe 2015, expo floor |
Innovative security research comes to Singapore |
Inside the German cybercriminal underground |
Inside the largely unexplored world of mainframe security |
Inside the Unpatched OS X Vulnerabilities |
Insider threat: A crack in the organization wall |
Insider trading ring hacked into newswire services, raked in $100M based on stolen info |
Installation of Tor Relay in Library Attracts DHS Attention |
Instapaper for Android vulnerable to man-in-the-middle attacks |
Intel establishes automotive security review board |
Intelligent packet capture for increased network visibility |
InterApp, the device that can hack any Smartphone |
Internet Root Name Servers Survive Unusual DDoS Attack |
Internet root servers flooded with 5 million queries a second |
iOS 9 boosts iPhone 6s and iPad Pro security with improved 2FA |
iOS 9 Hack: How to Access Private Photos and Contacts Without a Passcode |
iOS 9 partially fixes critical, easily exploitable AirDrop bug |
iOS 9 security flaw lets attackers access device through Siri |
iOS AirDrop vulnerability allows for malware installation on Apple devices |
iOS Masque Attack Weaponized: A Real World Look |
iOS Mobile Banking Apps, what is changed from 2013 tests? |
iOS Sandbox Vulnerability Puts Enterprise Data at Risk |
IoT attacks and evasion techniques will characterize threats in 2016 |
IoT developers concerned about privacy and data protection |
IoT devices are re-using cryptographic keys, leaving in danger millions of devices |
IoT devices: The good, the bad and the ugly |
IP camera manufacturers force researcher to pull conference talk |
Ipswitch offers secure managed file transfer analytics and reporting |
Iranian Cleaver hackers exploit LinkedIn for cyber espionage |
Iranian Government says Daesh doesn’t pose a threat to Iran |
Iranian Hackers focus their efforts in Android RATs |
Iranian hackers penetrated computers of a small dam in NY |
IRS Hack May Implicate Three Times As Many Taxpayers Than Expected |
IS hackers are attacking the US energy grid |
Is he Satoshi Nakamoto? Australian Police raid home of the alleged Bitcoin father |
Is Play Station Network under attack? Users reported issues |
Is the Cybersecurity Act of 2015 effective? |
Is the North Korea behind the attack on the Seoul Subway Operator? |
Is This Security-Focused Linux Kernel Really UnHackable? |
Is this the death knell for the RC4 encryption algorithm? |
Is Vuvuzela the most secure SMS text messaging system? |
Is your board ready for a security incident? |
ISC's infocon turns yellow to reflect critical impact of Juniper backdoors |
iSight Partners says the Sandworm APT is involved Ukrainian power outage |
ISIS Calls Anonymous "IDIOTS" and Issues 5 Lame Tips for its Members to Avoid Getting Hacked |
ISIS Hacker who Passed U.S. Military Data to Terrorists Arrested in Malaysia |
ISIS members have developed a mobile app for its communications |
ISIS operation security guide gives insight into group's cybersecurity practices |
ISIS recruited experts set to wage chemical and biological attacks |
ISIS Supporter Hacks 54,000 Twitter Accounts and Posts Details of Heads of the CIA and FBI |
Isle of Man taxpayers' info leaked due to email error |
IT admits obstacles to user mobility due to security concerns |
IT priorities are changing: Cloud-first strategy to rise |
IT Security in SMEs: Guidelines published by UNICRI |
IT teams expect a nightmare during the holidays |
IT threat evolution in Q2 2015 |
IT threat evolution in Q3 2015 |
IT use of cloud surges to record heights |
It Works! Google's Quantum Computer is '100 Million Times Faster' than a PC |
It’s official! People want a more trustworthy Internet |
Italian intelligence plans to monitor also communications through the Playstation |
It's not just about Big Data, it's what you do with it |
It's Now Legal to Jailbreak Smart TV, Smartphone Or Tablet |
It's official: The average DDoS attack size is increasing |
It's undeniable, IoT will change security forever |
Ivan Ristic and SSL Labs: How one man changed the way we understand SSL |
J |
Jail Authorities Mistakenly Early Released 3,200 Prisoners due to a Silly Software Bug |
January Android security update fixes 5 critical flaws, removes unneeded component |
Japanese Banking Trojan Shifu Combines Malware Tools |
JavaScript DDoS Attack Peaks at 275,000 Requests-Per-Second |
Jessy Irwin on Password Security, Opsec and User Education |
JetAudio and JetVideo media player vulnerability allows arbitrary code execution |
Joomla 3.4.5 patches Critical SQL Injection Vulnerability |
Joomla SQL Injection Vulnerability exploited in the wild |
Joomla under attack due to a zero-day. Patch your CMS now! |
Joomla Update Patches Critical SQL Injection Vulnerability |
JPMorgan Hack — Three Men Charged in Biggest Bank Hack in History |
JPMorgan hackers also hacked an anti-fraud corporation |
Juniper Backdoor Picture Getting Clearer |
Juniper Firewalls with ScreenOS Backdoored Since 2012 |
Juniper to kill off Dual_EC RNG in ScreenOS following new backdoor revelations |
Just $1400 to build an IMSI catcher like device to track phones |
Just Like Old Days: IOT Security Pits Regulators Against Market |
Just Like Windows 10, Windows 7 and 8 Also Spy on You – Here’s How to Stop Them |
K |
Karma Police, how GCHQ tried to track every visible user on Internet |
Kaspersky DDoS Intelligence Report Q3 2015 |
Kaspersky Security Bulletin 2015. Top security stories |
Kaspersky Security Bulletin. 2016 Predictions |
Kazakhstan makes it Mandatory for its Citizens to Install Internet Backdoor |
KeeFarce Hacking tool steals encrypted credentials from KeePass password manager |
Keep your site more secure with WordPress 4.3 |
Kemoge – Malicious Android Adware Infects Devices worldwide |
Kemoge Android Adware Campaign Can Lead to Device Takeover |
Kemoge: Latest Android Malware that Can Root Your Smartphone |
Key developments on the cyber threat landscape in 2016 |
Keyboard app bug puts millions of Samsung mobile users at risk, researcher claims |
KILLER! Unpatched WinRAR Vulnerability Puts 500 Million Users At Risk |
Kim Dotcom loses Fight Against Extradition to the US |
Kim Dotcom's Decentralized Internet — For You, Powered By You |
Kingston releases encrypted USB with keypad access |
Kryptografie |
L |
Lack of skills and recruiting among challenges facing information security profession |
Lack of visibility and security concerns hinder cloud adoption |
Lasers can ‘immobilize driverless cars’ |
LastPass 4.0 features fresh UX, emergency access, sharing center |
LastPass breached, hashed master passwords compromised |
LATENTBOT, one the highly obfuscated backdoor in the wild |
Latest APT 28 Campaign Incorporates Fake EFF Spearphishing Scam |
Latest EMET Bypass Targets WoW64 Windows Subsystem |
Latest iOS 9.0.1 Update Failed to Patch Lockscreen Bypass Hack |
Leaked Hacking Team emails show Saudi Arabia wanted to buy the company |
Lenovo Caught (3rd Time) Pre-Installing Spyware on its Laptops |
Lenovo Patches Vulnerabilities in System Update Service |
Let’s Encrypt Hits Another Free HTTPS Milestone |
Let’s Encrypt Initiative Enters Public Beta |
Let's Encrypt CA releases transparency report before its first certificate |
Let's Encrypt CA to issue its first cert |
Let's Encrypt Free SSL/TLS Certificate Now Trusted by Major Web Browsers |
Let's Encrypt Project issues its First Free SSL/TLS Certificate |
Li-Fi is 100 times Faster than Wi-Fi Technology: Real-World Tests Prove |
Like it or not, Microsoft Plans to Push Windows 10 Upgrade more Aggressively |
Linksys wireless routers are open to cyber attacks |
Linode forces password reset for all users due to suspected breach |
Linux container security and certification concerns remain |
Linux machines can be "owned" by hitting backspace 28 times |
Linux ransomware already infected at least tens of users |
Linux x86_64 Bindshell with Password (92 bytes) |
Linux XOR DDoS Botnet delivers potent DDoS attacks |
List of approved Windows 10 compatible security products |
LockerPin Ransomware Resets PIN and Permanently Locks Your SmartPhones |
LogMeIn to acquire LastPass for $125 million |
Long-term skills shortage drives tech salaries up |
Looks like mobile device security is on nobody's mind |
LowLevel04 ransomware exploits Remote Desktop to spread |
M |
Mabouia: The first ransomware in the world targeting MAC OS X |
Mac OS X is the software with most vulnerabilities in 2015 |
MagSpoof: A device that spoofs credit cards, disables chip-and-PIN protection |
Major browser makers synchronize end of support for RC4 |
Major Xen update fixes over 20 vulns, including guest/host escape flaw |
Malicious advertisements surge! 260% spike in 2015 |
Malvertisers abused Yahoo’s ad network for days |
Malvertising attack hit The Economist, anti-ad blocking service PageFair hacked |
Malvertising campaign targeted the Forbes Website, million users at risks |
Malware on the Smart TV? |
Malware threats on pirated content sites |
Malware-based attack targets America’s Thrift Stores |
Man gets 50 months in prison hacking U.S.-based financial institutions |
Man stole special agent's identity, executed a complex identity theft scheme |
Manipulating WSUS to Own Enterprises |
Many popular Android apps fail to encrypt login credentials |
Map a path through the issues of cloud, security, data analytics |
Mapping the underground cybercrime economy in order to disrupt it |
Mark Zuckerberg Plans to Build Iron Man's JARVIS like Artificially Intelligent Assistant |
Mark's Milestone: 1 Billion People Uses Facebook in A Single Day |
Mass adoption of mobile payment services derailed by security, privacy concerns |
Massive campaign uses router exploit kit to change routers' DNS servers |
Mastercard is trying out purchase verification with selfies |
McAfee study on the prices of stolen data on the Dark Web |
Meet Linux's New Fastest File-System – Bcachefs |
Meet The World's First Person Who Hacked His Body to Implant a Bitcoin Payment CHIP |
Meet World's Fastest Wi-Fi Router (Looks Like an Alien) |
Microsoft 'Accidentally' pushed 'Test patch' Update to All Windows 7 Users |
Microsoft bans Superfish-like adware methods starting in March 2016 |
Microsoft Collecting More Data of Windows 10 Users than Initially Thought |
Microsoft Considers Earlier SHA-1 Deprecation Deadline |
Microsoft Cracks Down on Toolbars, Unsigned DLLs with Edge Update |
Microsoft details how Device Guard fights malware in Windows 10 |
Microsoft doesn’t want Windows 10 Users to Switch to Chrome or Firefox |
Microsoft Edge: New browser, new risks for Windows 10 |
Microsoft expands Bug Bounty programs, increases rewards |
Microsoft fixes critical flaws in all versions of Windows and Office |
Microsoft fixes critical vulnerabilities affecting Windows and Office |
Microsoft flags Ask toolbar as unwanted and dangerous |
Microsoft has Built its own Linux Operating System |
Microsoft Chooses Ubuntu Linux for their Cloud-based Azure HDInsight Big Data Solution |
Microsoft is Auto-Downloading Windows 10 to PCs, Even If You Don't Want it |
Microsoft issues emergency patch for IE flaw exploited in the wild |
Microsoft Keeps Backup of Your Encryption Key on it's Server — Here's How to Delete it |
Microsoft kills many critical flaws, some 0-days, un-trusts one wildcard cert |
Microsoft maintains the recovery key of your new PC |
Microsoft Opens .NET Core, ASP.NET Bug Bounties |
Microsoft Outlook flaw opens the door to “mailbomb” attacks |
Microsoft Patches Critical Vulnerabilities in New Edge Browser |
Microsoft Patches Graphics Component Flaw Under Attack |
Microsoft Pays $24,000 Bounty to Hacker for Finding 'Account Hacking' Technique |
Microsoft plugs another Windows zero-day with emergency patch |
Microsoft pushes out security updates, plugs holes actively exploited by attackers |
Microsoft Releases 12 Security Updates (5 Critical and 7 Important Patches) |
Microsoft Responds To Windows 10 Spying Concerns, But It will Still Collect Your Data |
Microsoft Revokes Trust for Certificates Leaked by D-Link |
Microsoft Security Bulletin MS15-093 - Critical OOB - Internet Explorer RCE |
Microsoft Security Updates November 2015 |
Microsoft Security Updates October 2015 |
Microsoft WARNING — 'Use Windows 7 at Your Own Risk' |
Microsoft warns of imminent end of support for all but the latest Internet Explorer versions |
Microsoft will add SSH support to PowerShell |
Microsoft will Inform You If Government is Spying on You |
Microsoft will stop trusting certificates from 20 Certificate Authorities |
Microsoft Windows 10 is now Installed on over 200 Million Devices |
Microsoft, Law Enforcement Collaborate in Dorkbot Takedown |
Microsoft's new security posture leads to baked-in security |
Mikko Hyppönen warns the ISIS has a credible offensive cyber capability |
Millions affected by Scottrade brokerage breach that dates back two years |
Millions of IoT Devices Using Same Hard-Coded CRYPTO Keys |
Millions of smart devices at risk from 3-year-old flaw |
Millions of smartphones, IoT devices risk compromise due to 3-year-old bug |
Mission '1 Billion' — Microsoft will Automatically Offer Windows 10 Upgrade |
Mission: Hacking Grandma. Level: piece of cake |
MIT Scientists: Now You Can See Through Walls with Wi-Fi |
Mobile ad network exploited to launch JavaScript-based DDoS attack |
Mobile Ad Network exploited to run a major DDoS Attack |
Mobile payments data breaches expected to grow |
Mobile users continue to put personal and corporate data at risk |
Model Assesses Readiness to Accept Outside Vulnerability Reports |
Modern railroad systems vulnerable to cyber attacks |
ModPos, the most complex POS malware ever seen |
Moonpig Warns Customers of ‘Security Issue’ |
More than 100 Million Android users at risk due to the Baidu Moplus SDK |
More than 250 iOS Apps Caught Using Private APIs to Collect Users' Private Data |
More than 900 embedded devices share hard-coded certs, SSH host keys |
More than a third of employees would sell company data |
Most are concerned about security of healthcare data |
Most are unaware of the seriousness of medical data theft |
Most companies don't believe their information security meets their organization's needs |
Most consumers believe cloud-based apps can be hacked |
Most consumers concerned about becoming victims of online crime |
Most employees are not malicious, but their carelessness can be just as damaging |
Most employees don't understand the value of data |
Most IT pros oppose government backdoor access |
Most security executives lack confidence in their security posture |
Most vulnerabilities on enterprise networks are two years old |
Mozilla Embraces Private Browsing with Tracking Protection in Firefox 42 |
Mozilla increases rewards given out to bug hunters |
Mozilla Patches Bug Used in Active Attacks |
Mr. Grey Hacker (Wanted by FBI) Steals 1.2 BILLION Login Passwords |
mSpy finally admits they've been hacked |
Musical Chairs Campaign Found Deploying New Gh0st RAT Variant |
My Government Doesn't Understand How Encryption and Cyber Security Work |
N |
N3XT — Advanced CHIP that Could Make Your Computer 1000 Times Faster |
Naikon APT Group backed by the Chinese PLA Unit 78020 |
Naikon APT Group Tied to China’s PLA Unit 78020 |
NCA launched #CyberChoice campaign, to prevent youngsters become cyber criminals |
Nearly 2% of all smartphones are compromised or high risk |
Nearly 2,000 Vodafone UK customers' accounts compromised, blocked |
Nearly all websites have serious security vulnerabilities |
Nemesis Bootkit — A New Stealthy Payment Card Malware |
NeoKylin: China's Linux OS that Seriously Looks Like Windows XP |
Nest camera, has a different definition for Turn off Mode |
Nested backdoor affects 600,000 Arris cable modems |
Netflix Sleepy Puppy Awakens XSS Vulnerabilities in Secondary Applications |
Netgear Nighthawk X4S AC2600 Smart WiFi Router released |
Netgear Published Patched Firmware for Routers Under Attack |
Netgear Published Patched Firmware for Routers Under Attack |
Netgear Router Exploit in the wild |
Network protocol analyzer Wireshark 2.0 released |
Network security firewalls approach $1 billion in 2Q15 |
Network Time Protocol flaws can cause chaos on a global scale |
New "Do Not Track" standard released |
New Android bug can put devices into a coma |
New Android malware could inflict $250,000 of losses |
New Android Ransomware Communicates over XMPP |
New Apple Gatekeeper bypass can allow running rouge applications |
New Attack Targeting Microsoft Outlook Web App (OWA) to Steal Email Passwords |
New attacks on critical communications infrastructure in the US |
New Botnet Hunts for Linux — Launching 20 DDoS Attacks/Day at 150Gbps |
New Bug in Bugzilla Software Could Expose Zero-Day Vulnerabilities |
New Campaign Shows Dridex Active, Targeting French |
New date for migrating off vulnerable SSL and early TLS encryption |
New DDoS attacks misuse NetBIOS name server, RPC portmap, and Sentinel licensing servers |
New Debian Releases Fix PHP, VirtualBox Bugs |
New Drupal versions fix admin account hijack flaw |
New Dyre variant can target Windows 10 and Microsoft Edge users |
New Dyre variant in the wild supports Windows 10 and Microsoft Edge |
New EU rules on data protection put the citizen back in the driving seat |
New flash storage architecture capable of 1TB/s |
New Google Drive phishing campaign exposed |
New insight on the Rocket Kitten Iranian hacking crew |
New Joomla release patches a serious SQLi flaw |
New law allows French police to seize and search electronic devices without a warrant |
New Long-Range Wi-Fi Standard Offers Double Range to Home Devices |
New Moker RAT Bypasses Detection |
New OpenSSL versions squash LogJam bug |
New password recovery scam hitting Gmail, Outlook and Yahoo Mail users |
New SANS course teaches infosec pros how to ruin attackers' day |
New Spy Banker Trojan Telax exploits Google Cloud Servers |
New Steam escrow system drives impatient users to fake trading sites serving malware |
New threats will demand new approaches such as micro-segmentation and quantum encryption |
New Tinba Variant Seen Targeting Russian, Japanese Banks |
New Toshiba CMOS image sensor improves recognition and authentication |
New updates on Cyber Conflict Agenda 2016 and what’s new in ‘Cyber power’ |
New Versions of Carbanak Banking Malware Seen Hitting Targets in U.S. and Europe |
Next year, smart cities will use 1.6 billion connected things |
Nigerian scammers are stealing millions from businesses |
Nine arrested in UK investigation of criminal network defrauding bank customers |
NIST releases SHA-3 cryptographic hash standard |
NIST revises security publication on random number generation |
NIST updates ICS security guide |
North Korea's Red Star OS (Looks Like Mac OS X) Spies on its Own People |
Notorious Shm00p hacker Claims he helped the FBI find ISIS Hacker Junaid Hussain |
Nový Chrome rozšíření pomáhá v boji klávesnice Biometrické profilování |
NSA broke trillions of encrypted connections due to a flaw |
NSA SHARKSEER program aims to detect and mitigate malware Zero-Day |
NSA-linked Spying Malware Infected Top German Official's Computer |
NSF Awards $6M Grants for Internet of Things Security |
Nuclear Exploit Kit Spreading Cryptowall 4.0 Ransomware |
Nuclear facilities are wide open to cyber attacks |
NY Health Provider Excellus Discloses Data Breach Dating to 2013 |
O |
Obama Encryption Policy: White House Will Not Force Companies To Decode Encrypted Data |
Offline Ransomware is spreading among Russian users |
Old MS Office feature can be exploited to deliver, execute malware |
OmniRat RAT is currently being used by criminals in the wild |
On the trail of Stagefright 2 |
One in 20 apps on private PCs are end-of-life |
One in 600 websites exposes sensitive info via easily accessible .git folder |
Online summer travel scams to watch out for |
Online Trust Alliance releases new Internet of Things Trust Framework |
Only 37% of SMBs think they're equipped to manage IT security |
Only 5% of organizations protect credentials |
Open source KeeFarce tool loots encrypted passwords stored in KeePass |
Open source security projects get $452,000 from the Linux Foundation |
Open source Sleepy Puppy tool finds XSS bugs in target apps and beyond |
Open source tool checks for vulnerabilities on Android devices |
Open source Twittor tool can control botnets via Direct Messages |
OpenSSH 7.0 deprecates weak, legacy and unsafe cryptography |
OpenSSH 7.0 Fixes Four Flaws |
OpenSSH bug enables attackers to brute-force their way into poorly configured servers |
OpenSSL Patches Bring Last Update for 0.9.8 and 1.0.0 Branches |
Operation Black Atlas, PoS malware is flooding network worldwide |
Operational security and cybersecurity come together in Anaheim |
OPM hack shines light on abysmal state of US federal systems's security |
Oracle agrees to settle FTC charges it deceived consumers about Java updates |
Oracle CSO: You ‘Must Not Reverse Engineer Our Code’ |
Oracle Ordered to Publicly Admit Misleading Java Security Updates |
Oracle releases 154 fixes, plugs click-to-play bypass Java flaw used in attacks |
Organizations on the hunt for DevOps, IoT and mobile skills |
Outsourcing critical infrastructure (such as DNS) |
Over 5,000 mobile apps found performing in-app ad fraud |
OwnStar Attack Now Aimed at BMW, Chrysler, Mercedes Cars |
P |
PageFair Hack Serves Up Fake Flash Update to 500 Sites |
Pair of Bugs Open Honeywell Home Controllers Up to Easy Hacks |
Pair of Drupal Modules Patch Access Bypass Flaws |
Pangu cracking team has released the iOS 9 jailbreak |
Paris Attacks — NO! We Can't Blame Edward Snowden and Encryption for Terror Attacks |
Patent Troll — 66 Big Companies Sued For Using HTTPS Encryption |
Patch now! Adobe releases Emergency Security Updates for Flash Player |
Patch Report: All Versions of Windows affected by Critical Vulnerability |
Patched Android ‘Serialization’ Vulnerability Affects 55 Percent of Devices |
Patched Ins0mnia Vulnerability Keeps Malicious iOS Apps Hidden |
Patched Libpng Vulnerabilities Have Limited Scope |
Patreon crowdfunding site hacked and data leaked online |
Pawn Storm APT targets MH17 crash investigation |
Pawn Storm used a new Flash Zero-Day in attacks on the NATO & the While House |
Payment card info of 93,000 Web.com customers stolen |
Payment systems at Hyatt Hotels have been compromised |
PayPal stored XSS vulnerability exposed |
PayPal Vulnerability Allows Hackers to Steal All Your Money |
Pentagon's unclassified email system breached, Russian hackers blamed |
Pen-testing drone searches for unsecured devices |
Persistent cyber spies try to impersonate security researchers |
Persistent XSS flaw in SharePoint 2013 revealed, patched |
Person VUE Credential manager system has been compromised |
Personal info of 12+ million Dutch mobile phone owners easily accessible to hackers |
Personal info of 15 million T-Mobile USA customers stolen in Experian breach |
Personal info of 4 million US government workers compromised in OPM breach |
Perspectives on the state of Internet security |
Phantom Squad took credit for the PlayStation network outage |
Phantom Squad wants to take down Playstation network and Xbox Live on Christmas |
Phishers are targeting millions of DHL customers |
Phishers register domain names, hammer traditional targets |
Phishing attacks targeting businesses are escalating |
Phishing campaign leveraging on Dropbox targets Hong Kong media |
Photo gallery: Black Hat USA 2015 Business Hall |
Photo gallery: Black Hat USA 2015, part 2 |
Photo: A walk through Cyber Security Europe 2015 |
PHP File Manager Riddled With Vulnerabilities, Including Backdoor |
PIN-changing, screen-locking Android ransomware |
Pirate Bay co-founder Gottfrid Svartholm, aka Anakata, Released from Prison |
PlayStation 4 Hacked to Run Linux |
Plex forums hacked: IPs, private messages, encrypted passwords compromised |
Point-and-shoot weapon stops drones without destroying them |
Police Arrested Hackers Who Stole Millions from European ATMs |
Police Body Cameras come with Conficker Worm |
Police Can't Force You To Unlock Your Phone, It violates Fifth Amendment Rights |
Police Raid alleged Bitcoin Creator Craig Wright's Home in Sydney |
Ponmocup, never underestimate a botnet that infected 15 million PCs |
Popular Android AppLock app full of gaping security holes |
Popular VPNs leak data, don't offer promised privacy and anonymity |
PostgreSQL 9.5: Row level security, Big Data and UPSERT |
Press backspace 28 times to hack a Linux PC with Grub2 |
Prevention is the best cure for identity theft |
Prices of stolen data on the Dark Web |
Privacy Badger 1.0 Released With Support For EFF Do Not Track Policy |
Privacy International helps individuals find out if they were spied on by the GCHQ |
Privacy profession: An equal playing field for men and women? |
Private email account of CIA Director compromised by teenage hackers? |
PrivaTegrity might bring an end to Crypto Wars |
Privatoria — Best VPN Service for Fast, Anonymous and Secure Browsing |
Privileged accounts are still easy to compromise |
Pro PoS — This Stealthy Point-of-Sale Malware Could Steal Your Christmas |
Pro PoS, a new PoS malware available for sale in the underground |
Project Zero Experts Found critical flaws in Samsung Galaxy S6 Edge |
Proposed Wassenaar pact changes will harm cyber defenders instead of attackers |
PROTECTING CYBER VENDOR SERVICES WITH CYBERLAW |
ProtonMail Back Online Following Six-Day DDoS Attack |
ProtonMail paid a $6000 Ransom to stop DDoS Attacks |
ProtonMail Paid Hackers $6000 Ransom in Bitcoin to Stop DDoS Attacks |
ProtonMail restores services after epic DDoS attacks |
PwnBin: A script for scraping Pastebin for leaked API keys, SSH credentials |
Q |
Qualys announces free global asset inventory service |
Quantum Teleportation — Scientists Teleported Quantum Data over 60 Miles |
R |
R.I.P Ian Murdock, Founder of Debian Linux, Dead at 42 |
Ransomware Attacks Threaten Wearable Devices and Internet of Things |
Ransomware infected the UK Parliament’s computer networks |
Ransomware will target also Medical Devices |
Raspberry Pi Zero — The $5 Tiny Computer is Here |
RaspBSD – FreeBSD distribution for Raspberry Pi |
Raw threat data is not effective, it's time for threat intelligence |
RCMP Cybercrime Strategy to fight online crimes |
Reactions to the Hacking Team breach |
Reactions to the IRS hack that impacted 100,000 people |
Reactions to the LastPass breach |
Recently Patched Adobe Flash Versions Hit by Another Zero-day Exploit |
Record-Breaking Deal: Dell to Buy EMC for $67 Billion |
Rekoobe a new malware targeting Linux users |
Released: New version of REMnux Linux distro for malware analysis |
Reminder! If You Haven't yet, Turn Off Windows 10 Keylogger Now |
Remote working on the rise despite security concerns |
Report: German Bank ATMs vulnerable to Hackers |
Report: The changing face of hacking |
Report: What you need to know to earn more in system administration and security |
Researcher hacks house arrest tracking system |
Researcher proves how easy it is to pull off homographic phishing attacks |
Researcher releases exploit for OS X 0-day that gives root access |
Researcher releases Free Hacking Tool that Can Steal all Your Secrets from Password Manager |
Researcher tests Tor exit nodes, finds not all operators can be trusted |
Researcher warns about Security Loopholes in Denmark's Largest Bank |
Researchers devise passive attacks for identifying Tor hidden services |
Researchers Discover Two New Strains of POS Malware |
Researchers Disrupt Angler Exploit Kit Ecosystem, Derail $30M Ransomware Campaign |
Researchers eliminate coding errors by using good code from "donor" apps |
Researchers find backdoor bug in NASA rovers' real-time OS |
Researchers hack Corvette via SMS to plugged-in tracking dongle |
Researchers hack Linux-powered sniper rifle |
Researchers hack Vizio Smart TVs to access home network |
Researchers make easy work of Android lockscreen security |
Researchers map out hard-to-kill, multi-layered spam botnet |
Researchers point out the holes in NoScript's default whitelist |
Researchers track Android users by collecting accelerator readings |
Researchers Uncover ‘Terracotta’ Chinese VPN Service Used by APT Crews for Cover |
Researchers Uncover New Italian RAT uWarrior |
Researchers-outline-vulnerabilities-in-yahoo-paypal-magento-apps |
Retailers are unaware of sensitive data leaks |
Revealed: What info the FBI can collect with a National Security Letter |
Risk management programs lack maturity, new strategies needed |
Risk managers most worried about loss of information confidentiality |
Risks from fraudulent mobile apps and unauthorized app stores |
Risky mobile behaviors are prevalent in the government |
Risky Schneider Electric SCADA Vulnerabilities Remain Unpatched |
Roaming Tiger Hackers targets Russian organizations for espionage |
Rockwell Patches Serious ‘FrostyURL’ PLC Vulnerability |
Rovnix malware is threatening Japanese bank customers |
Rowhammer.js: The first remote software-induced hardware-fault attack |
RSA Conference 2016: Connect to protect |
RSA Conference opens Innovation Sandbox Contest |
Russia deploys jamming systems in Syria as tensions rise |
Russia has a new anti wiretapping System |
Russia, Hackers Stole $4 Million in cash with Reverse ATM Hack method |
Russian ATM Hackers Steal $4 Million in Cash with 'Reverse ATM Hack' Technique |
Russian financial cybercrime: how it works |
Russian Hackers suspected for the intrusion of Dow Jones systems |
S |
Safeguarding data in the healthcare industry |
Sale of legitimate code-signing certs booms on darknet markets |
Salesforce Patches XSS on a Subdomain |
Samsung announces GAIA, a Smart TV security solution |
Samsung disables Windows Update, undermines the security of your devices |
Samsung LoopPay Hacked, but 'Samsung Pay' is Safe |
Samsung Portable SSD T3 offers increased data security and portability |
Samsung presented GAIA, a security solution for Smart TVs |
SanDisk unveils new wireless flash drive |
SAP Patches 12 SQL Injection, XSS Vulnerabilities in HANA |
Save the Date — 11th December: Anonymous to Celebrate 'ISIS Trolling Day' |
Scammers exploit mobile ads for easy profit |
Scammers target citizens filing tax returns online |
Scammers use Google AdWords, fake Windows BSOD to steal money from users |
Scan of IPv4 Space for ‘Implanted’ Cisco Routers Finds Fewer Than 100 |
Scanner Finds Malicious Android Apps at Scale |
Scottrade Breach Affects 4.6 Million Customers |
Script Kiddies can Now Create their Own Ransomware using This Kit |
Seagate wireless hard drives open wide to attack |
Second Russian pleads guilty in record US data breach |
Second teen arrested in Connection with the TalkTalk breach |
Second teenager arrested in connection with TalkTalk hack |
Secret code in color printers enables government tracking |
Section 215 of the Patriot Act expired last night |
Secure messaging service Telegram blocks 78 ISIS-related channels |
Secure networks are the key to unlocking A2P potential |
Securing the smart home environment |
Security concerns continue to dog the cloud industry |
Security experts disclosed SCADAPASS, a list of default credentials for ICS and SCADA systems |
Security experts explain to US, UK governments why mandated encryption backdoors are a bad idea |
Security flaws could allow attackers to steal over 100 different cars |
Security challenges emerging with the rise of the personal cloud |
Security of iMessage System Comes to the Fore Again |
Security pros acknowledge risks from untrusted certificates but take no action |
Security Sandboxes Challenged by Evolving Malware |
Security testing market to grow to $6.9 billion by 2020 |
Security update kills several critical bugs in Android Marshmallow |
Security updates for OS X, iOS fix bucketload of serious bugs |
Sen. Warren Worried About Banks’ New Encrypted Messaging Platform |
Series of Buffer Overflows Plague Many Yokogawa ICS Products |
Serious, Yet Patched Flaw Exposes 6.1 Million IoT, Mobile Devices to Remote Code Execution |
Several Critical Flaws Patched in Drupal Module |
Severe OpenSSL bug that allows certificate forgery has been plugged |
SHA-2 encryption will make many sites inaccessible to users who can't afford newer tech |
Shadow IT is prevalent in government agencies |
Shedun adware can install any malicious mobile app by exploiting Android Accessibility Service |
Shifu banking trojan is officially spreading to the UK |
Shocking! Instagram HACKED! Researcher hacked into Instagram Server and Admin Panel |
Shockwave player flaw exposes 450 million users at risk of hack |
Shoring up Tor |
Should the removal of personal info posted online be a human right? |
Schneider Patches Plaintext Credentials Bug in Building Automation System |
School monitoring software's hard-coded encryption key exposed |
Signal for Android finally out, offers end-to-end encrypted calls and messages |
Signal secure messaging app now available on the desktop |
Silent Circle launches Blackphone 2, delivering business and personal privacy |
Silent Circle promptly patched a critical flaw in the Blackphone I |
SilverPush technology tracks user habits with near-ultrasonic sounds |
Simply Secure offers free usability design help to developers of privacy, security tools |
SLOTH attacks weaken secure protocols because they still use MD5 and SHA-1 |
Smartwatches: A new and open frontier for attack |
Sniffing and tracking wearable tech and smartphones |
Snoopers’ Charter will cause extreme rise in business costs |
Snooping Samsung S6 calls with bogus base stations |
Social Engineering — Free Online Training for Hackers |
Social experiment: 200 USB flash drives left in public locations |
Social media security is still a low priority |
Social Networks – A Bonanza for Cybercriminals |
Sofacy APT hits high profile targets with updated toolset |
Solving the cybersecurity challenges of smart cities |
Somebody Offered Money to Raspberry Pi Foundation for Pre-Installing Malware |
Someone could break the Bitcoin Network on demand |
Someone Just Tried to Take Down Internet's Backbone with 5 Million Queries/Sec |
Someone wants infect millions of Raspberry Pi computers |
Sophisticated, successful Morpho APT group is after corporate data |
Sound-Proof: Two-factor authentication without user interaction |
South Korean Child Monitoring App Beset by Vulnerabilities, Privacy Issues |
Spam and phishing in Q3 2015 |
Spam Campaign Continuing to Serve Up Malicious .js Files |
SQL injection has surfaced as the no. 1 attack in 2015 |
Stagefright Bug 2.0 — One Billion Android SmartPhones Vulnerable to Hacking |
Stagefright Patch Incomplete Leaving Android Devices Still Exposed |
Stagnant budgets and rising insider security threats |
Stanford researchers identify potential security hole in genomic data-sharing network |
Starwood Hotel Chain Hit By Point of Sale Malware |
State-sponsored cyberattacks linked to Russian intelligence gathering |
Static encryption keys affect SAP security |
Stealing to the sound of music |
Stealthy GlassRAT Spies on Commercial Targets |
Stepping out of the dark: Hashcat went OpenSource |
Stolen Ashley Madison data dumped online, seems legitimate |
Stolen medical information affects 18 out of 20 industries |
Stolen or lost devices and the risks of remote working |
Stop DDoS attacks in seconds |
Strong passwords don’t matter if employees don’t secure them |
Study: Global cost of cyber crime |
Surge in global cloud application adoption |
Survey: Mobile Security - Confidence ebbs as BYOD booms |
Surviving in an IoT-enabled world |
Surviving in the IoT world: Risks of smart home devices |
Suspicious Windows 7 Update Actually an Accidental Microsoft ‘Test’ Update |
Swedish Court — 'We Can't Ban The Pirate Bay' |
Swift adoption of cloud and mobile drives insider threats |
Symantec fires employees who issued rogue Google certificates |
T |
Takedown of criminal gang behind ATM malware attacks |
Taking root |
TalkTalk breach: Attackers demand £80,000 for stolen data |
TalkTalk breach: Third arrest, data already for sale, criminals targeting pensioners |
TalkTalk data breach, hackers compromised 4 million customer records |
TalkTalk Hack: Police Arrest Second Teenager in London |
TalkTalk hack: Teenager arrested in Northern Ireland |
Target Says SEC Won’t Pursue Enforcement Action as a Result of Data Breach |
Targeted attacks on 4Chan and 8Chan exploited bot code in Imgur |
Teenage Lizard Squad hacker found guilty of 50,700 charges |
Tech support scammers start targeting users of Apple devices |
Techie Police Officer Builds a Sniffing Tool to Track Stolen Devices (based on War-Driving) |
Technical Support Scammers targets Apple users |
Tech-savvy users are actually the worst offenders |
Telegram — Secret Messaging app — Shuts Down 78 ISIS Channels |
Telegram Android app is a stalker's dream |
Telegram messaging service tries to ban ISIS, but.. |
Terror alert spam detected by Symantec in the wild |
Test your defensive and offensive skills in the eCSI Hacker Playground |
TGIF(P) – Thank god it’s fried phish |
The amazing adventures of personal data in European Union court |
The Angler Exploit Kit Exposed: Making $60 Million Annually by Delivering Ransomware |
The automation and industrialization of cyber attacks |
The average budget required to recover from a security breach |
The average cost of cybercrime escalates to $15 million per organization |
The average organization experiences 9 insider threats each month |
The barriers to cybersecurity research, and how to remove them |
The cyber labor market in Israel, the cyber guild |
The danger of terror attacks using drones, and possible countermeasures |
The Dark web – Why the hidden part of the web is even more dangerous? |
The Dow Jones firm confirmed data breach of 3,500 Users |
The Dridex Banking Malware is risen, British attention |
The Duqu 2.0 persistence module |
The evolution of ransomware: From PC Cyborg to a service for sale |
The French Gov wants to Block Tor and Forbid Free Wi-Fi |
The French Gov will not block Tor neither Free Wi-Fi |
The future of information security in the government |
The GasPot experiment: Hackers target gas tanks |
The German Intelligence Systematically Spied on Allies |
The Hacking crew known as Gaza cybergang was very active in Q2 2015 |
The Hello Barbie doll, lights and shadows |
The changing role of the risk manager |
The impact of data breaches on customer loyalty |
The impact of digital business on information security |
The Infernal-Twin tool, easy hacking wireless networks |
The ISIL is trying to hack American electrical power companies |
The ISIS guide, how to stay secure online |
The ISIS has the ability to make fake Syrian passports |
The Jailbreaking procedure is now legal in the United States |
The leading cause of insider threats? Employee negligence |
The look and feel of Infosecurity Europe 2015 |
The most damaging ramifications of DDoS attacks |
The mystery behind the Internet-of-Things vigilante malware |
The new Nmap 7 version just released |
The North American cyber-criminal underground it’s easy to access! |
The number of fingerprints stolen in OPM hack rose to 5.6 million |
The number of Governments using the FinFisher Spyware is increased |
The official website of the popular vBulletin forum has been hacked |
The privacy risks of school technology tools |
The Ramnit Botnet is back after the law enforcement takedown |
The rapid growth of the bug bounty economy |
The Rapid Increase in the Sophistication of Exploit Kits |
The rise of .NET and Powershell malware |
The rise of artificial intelligence technologies |
The rise of mobile transactions and online lending fraud |
The rise of repeated "low and slow" DDoS attacks |
The rise of the Japanese Cybercrime Underground |
The security community's reaction as CISA passes US Senate |
The senior advisor behind Silk Road has been arrested |
The Shade Encryptor: a Double Threat |
The Shopify commerce platform is open to RFD attacks |
The Signal app is available in beta version |
The Smurf Suite – GCHQ can hack your phone with a text message |
The Sony PlayStation Network is down worldwide |
The state of the mobile ecosystem |
The surveillance firm Hacking Team is back stronger than before |
The top 7 improvements in Nmap 7 |
The Tor Project announces bug bounty program |
The Tor Project Is launching the Tor Bug Bounty Program |
The Trojan Games: Odlanor malware cheats at poker |
The unstoppable rise of DDoS attacks |
The US DoD still uses SHA-1 signed certificates for use by military agencies |
The US military is still sending un-encrypted emails |
The value in vulnerability management platforms |
The value of threat intelligence |
The Website of the Norwich airport hacked, a cue to reflect |
The World's First $9 Computer is Shipping Today! |
The worst data disasters from 2015 |
Theoretical computer science provides answers to data privacy problem |
These Top 10 Programming Languages Have Most Vulnerable Apps on the Internet |
These Top 30 Ashley Madison Passwords are just as Terrible as You'd Think |
These Top 7 Brutal Cyber Attacks Prove 'No One is Immune to Hacking' — Part I |
These Top 7 Brutal Cyber Attacks Prove 'No One is Immune to Hacking' — Part II |
Think twice about Android root |
Third suspect arrested in connection with the TalkTalk breach |
This Computer Chip Self-Destructs in 10 Seconds (On Command) to keep Secrets Safe |
This Creepy App Captures Users' Private Moment Photos and Blackmails for Money |
This is How Tokyo Police Catching Rogue Drones in the Sky |
This Malware Can Delete and Replace Your Entire Chrome Browser with a lookalike |
This Malware Can Secretly Auto-Install any Android App to Your Phone |
This 'Radio Wave' Hack allows Hackers to Control Your Phone From 16 Feet Away |
This Secure Operating System Can Protect You Even if You Get Hacked |
Thousands of Hacked WordPress Sites Abused to Infect Millions of Visitors |
Thousands of Magento websites compromised to serve malware |
Thousands of Zhone SOHO routers can be easily hijacked |
Thousands stolen identities of Britons available on the Darkweb |
Threat actors hacked the popular Touchnote company |
Threat and vulnerability management market revenue to reach $5.3 billion |
Threat intelligence: Sources, sharing, utilization and the government |
Three indicted in largest theft of customer data from a U.S. financial institution in history |
Three men charged for the attack on the JPMorgan Chase |
Three simple ways to prevent a data breach |
Thunderstrike 2 OS X Firmware Attack Self-Replicates to Peripherals |
Time to update your Veeam to fix a VeeamVixProxy Vulnerability |
Time Warner Cable security breach may have exposed 320K customers |
Tips and Tricks to Hide from Big Brother’s Watchful Eye |
Tips for implementing a converged infrastructure |
Tips for managing and securing SSH keys |
Tis the season for shipping and phishing |
TLS Implementations Vulnerable to RSA Key Leaks |
T-Mobile customer data stolen from Experian already for sale |
To pay or not to pay – the dilemma of ransomware victims |
Today NSA has Stopped its Bulk Phone Surveillance Program |
Too many vulnerable medical systems can be found online |
Top 10 — 2016 New Year's Resolutions for Cyber Security Professionals |
Top 10 technology challenges for IT audit professionals |
Top 10 U.S. cities for online fraud |
Top 8 Cyber Security Tips for Christmas Online Shopping |
Top cloud security issue? Lack of visibility |
Top IoT concerns? Data volumes and network stress |
Top obstacles to EMV readiness |
Top strategic IT predictions for 2016 and beyond |
Top tips on safe online banking from the comfort of your home |
Tor Project claims FBI paid university researchers $1m to unmask Tor users |
Tor Project to Start Bug Bounty Program — Get Paid for HACKING! |
Tor Releases Anonymous Instant Messenger. Here's How to Use It |
Tor security improves as .onion becomes a special-use domain name |
Tor: FBI Paid CMU $1 Million to De-Anonymize Users |
Torrent websites infected 12 million Internet users per month |
Total cost of average data breach reaches $3.8 million |
Toymaker VTech Hack Exposes 4.8 Million Customers, including Photos of Children |
Tracking Hacker Forums with Traffic Analysis |
Travel smart: Tips for staying secure on the road |
Trends that will alter the way IT is consumed in 2016 |
Trident nuclear weapons system could be vulnerable to cyber attacks |
Trojanized adware: already infected more than 20,000 Android Apps |
Trojanized versions of 20,000 popular apps found secretly rooting Android devices |
TrueCrypt Encryption Software Has Two Critical Flaws: It's time to Move On |
TrueCrypt is safer than previous examinations suggest |
Turkish hackers took over a Russian Govt Instagram account |
Turkish officers are in contact with members of the ISIS |
Turkish systems under attack. Is it information warfare? |
Turla APT Group Abusing Satellite Internet Links |
Turris Omnia Security Project protects home network users |
Twitter Open Sources 'Diffy' that Automatically Catches Potential Bugs in Code |
Twitter users warned about being targeted by state-sponsored attacks |
Twitter warns victims of state-sponsored attacks |
Twittor tool uses Twitter direct messages to control botnets |
U |
U.S. charges a suspect with cyber terrorism for the first time |
UDP-based Portmap latest target for DDoS attackers looking to amplify attacks |
uh-oh! North America Runs Completely Out of IPv4 Internet Addresses |
UK ANPR systems are one of the ‘world’s biggest surveillance systems’ |
UK businesses ‘number one target for cybercriminals’ |
UK dating fraud victims lost £33,5 million last year |
UK Gov could hack children’s smart toys to Spy on suspects |
UK High Court declares emergency surveillance bill unlawful |
UK job recruiters network hit by hacker, user info dumped online |
UK workers are significantly lacking in security awareness |
UK, US law enforcement agencies disrupt Dridex botnet |
UK’s NCA calls for global approach to cybercrime |
Unauthorized code found in Juniper’s firewall OS |
United Airlines hacked by same group that breached Anthem and OPM |
University implies they helped FBI break Tor protection because of a subpoena |
Unpatched Drupal flaws open websites to attacks |
Unpatched OS X, iOS flaws allow password, token theft from keychain, apps |
Unsafe password policies leave shoppers vulnerable |
Unsupported Honeywell Experion PKS Vulnerable to Public Attacks |
Unsurprisingly, companies are not protecting personal information |
Unsurprisingly, most would support eliminating passwords |
Untethered Jailbreak for iOS 9.0, 9.0.1 and 9.0.2 Released |
Unusual Re-Do of US Wassenaar Rules Applauded |
Upcoming trends in the SIEM market |
Updated Cryptowall Encrypts File Names, Mocks Victims |
Updated DGA Changer Malware Generates Fake Domain Stream |
Updated Rig Exploit Kit Closing in on 1 Million Victims |
Updated XcodeGhost Adds iOS9 Support |
UPnP Trouble Puts Devices Behind Firewall at Risk |
Uptick in Neutrino Exploit Kit Traffic Doesn’t Mean Angler Reign Over |
US Air Force Wireless hacking in Flight |
US and UE, a joint effort against the Dridex Botnet |
US Army Experts Call for military bug bounty program AVRP |
US DOJ admits that Stingrays can be used to intercept call and SMS content |
US Eavesdropping on Netanyahu Communications |
US Energy Department's systems breached 159 times in four years |
US Library of Congress makes tinkering with your car software legal |
US OPM takes vulnerable background investigation portal offline |
US Ports – Cyber attacks can cause the release of dangerous chemicals |
US state police cars are vulnerable to cyberattack |
US will revise Wassenaar pact changes |
US, UK spies reverse-engineered security software in search for flaws |
USB Killer 2.0 – How to easily burn a PC with a USB device |
USB Killer 2.0: A harmless-looking USB stick that destroys computers |
Users find backdoors to do their job |
Users force LinkedIn to bring back connections download tool used by scrapers |
Using BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks |
V |
Valasek: Today’s Furby Bug is Tomorrow’s SCADA Vulnerability |
Valve Patches Password Reset Vulnerability in Steam |
Variety Jones, A Senior Adviser to Silk Road arrested in Thailand |
vBulletin security patches and zero-day exploit available online |
vBulletin, Foxit forums hacked, attacker exploited a zero-day flaw? |
Vegan and BeEF clash shows how cyber arms race never stops |
VeraCrypt Patched Against Two Critical TrueCrypt Flaws |
Verizon and Splunk deliver actionable threat intelligence |
Victims of June OPM Hack Still Haven’t Been Notified |
Victims of the Gomasom Ransomware can now decrypt their files for free |
Video training course: Computer and hacking forensics |
Video training course: Penetration testing and ethical hacking |
Video: General Data Protection Regulation, Safe Harbor Agreement, Copyright reform and the Google case |
Virus Bulletin 2015 |
Virus Bulletin small talk: Diversity in tech |
Viruses, bulletins, surveys, and gender: hashtag #VB2015 |
VirusTotal Adds Sandbox Execution for OS X Apps |
VirusTotal now Scans Mac OS X Apps for Malware |
Vision for a new generation of experimental cybersecurity research |
Vizio Smart TVs track your viewing habits, info is sold to third parties |
VMware Patches Pesky XXE Bug in Flex BlazeDS |
Voice as a threat: VoLTE, a new tool to compromise mobile networks |
VPN protocol flaw allows attackers to discover users' true IP address |
VPN users be aware , Port Fail flaw can reveal your identity |
VTech data breach gets worse: Children's pictures and chat logs were also compromised |
Vtech hacked, data of thousands of kids exposed |
Vulnerabilities Identified in Dolphin, Mercury Android Browsers |
Vulnerabilities in 2015: 0-days, Android vs iOS, OpenSSL |
Vulnerabilities in security software leave users open to attacks |
Vulnerability and configuration management for Amazon Web Services |
Vulnerability Identified in Genomic Data Sharing Network |
Vulnerability management embraces new functions |
Vulnerable gambling apps put corporate data at risk |
Vulnerable medical equipment details disclosed online |
Vuvuzela: An untraceable messaging system aimed at thwarting powerful adversaries |
Výzkumníci Manipulovat pušky Precision Cílení System |
W |
w00t! Google OnHub Router actually Runs on Chrome OS; Here's How to Root it |
W3C to make payments easier and more secure |
Want WhatsApp Free Video Calling? This Leaked Screenshot Reveals Upcoming Feature |
Wargame teaches senior leaders about strategic threats and risks |
Warning! Popular Apple Store Apps Infected with Data-Theft Malware |
Warning! Seagate Wireless Hard Drives Have a Secret Backdoor for Hackers |
Warning: 18,000 Android Apps Contains Code that Spy on Your Text Messages |
Washington state sues iYogi tech support firm for scamming users |
WD self-encrypting hard drives |
Wealth of personal data found on used electronics purchased online |
Web Hosting Service 000webhost Hacked, Information of 13 Million Leaked |
Web.com Loses 93,000 Credit Card Numbers in Breach |
Week in review: Android ransomware multiplies, FireEye censors researcher |
Week in review: Apple tackles XcodeGhost malware, AVG will sell user data, iOS 9 exploit is worth $1 million |
Week in review: Criminals hacked chip-and-PIN system, secret code in printers allows tracking, and insecure |
Week in review: DDoS attack on ProtonMail, 0-days found in Samsung Galaxy S6 Edge |
Week in review: Dell computers shipped with root CA cert and private key, analytics services tracking users via Chrome extensions |
Week in review: Drone detection, crypto wars, and tracking wearable tech |
Week in review: Emergency patches for actively exploited flaws, HTML5 can be used to hide malware |
Week in review: First ever EU rules on cybersecurity, insider threats, and the new issue of (IN)SECURE Magazine |
Week in review: Hiding exploit code in images, online summer travel scams, and Infosecurity Europe 2015 |
Week in review: Information the FBI can collect with NSLs revealed, VPN protocol flaw gives away users' true IP address |
Week in review: iOS malware compromising Apple accounts, and fake recruiters on LinkedIn targeting infosec pros |
Week in review: Linux ransomware, university researchers unmask Tor users, and how one man changed the way we understand SSL |
Week in review: Logjam bug, trojanized PuTTY, and the importance of encryption and key management |
Week in review: Mainframe security, cross-device tracking, and how online fraud will evolve in 2016 |
Week in review: Malicious Cisco router implants, .onion becomes a special-use domain name, and the new issue of |
Week in review: New C++ bugs, preventing insider threats, and gamifying threat detection |
Week in review: New OS X threats, and how to protect your privacy on Windows 10 |
Week in review: Popular VPNs leaking data, and the new issue of (IN)SECURE Magazine |
Week in review: Rethinking security, LastPass breach, and stronger data protection rules for Europe |
Week in review: ScreenOS backdoor, Twitter warns about state-sponsored attacks, and MacKeeper data breach |
Week in review: SLOTH attacks, JavaScript-based ransomware, and hacking medical implants |
Week in review: The evolution of the CISO, a simple Gatekeeper bypass, and Stagefright 2.0 |
Week in review: The price of the Internet of Things, YiSpecter hits non-jailbroken iOS devices, and the most secure |
Week in review: TLS security, malicious Tor exit nodes, how to find a free, secure proxy service |
Week in review: Tools for detecting Hacking Team spyware, vulnerable Smart Home Hubs, |
Week in review: WhatsApp data collection, roadblocks to implementing CISA, and how US law enforcement uses Stingrays |
Week in review: WiFi jamming, Flash zero-day actively exploited, and abusing the Internet of Things |
Week in review: Windows 10 security features, and thwarting user profiling based on typing behavior |
Well-informed tech support scammers target Dell users |
Western Digital self-encrypting hard drives are completely insecure |
Western Digital self-encrypting hard drives are not secure |
What can we expect from 2016? A growth in online extortion, hacktivism and mobile malware |
What drives employees to shadow IT? |
What is a secure OS? |
What is Threat Intelligence and How It Helps to Identify Security Threats |
What You Should Know about Triangulation Fraud and eBay |
What's burning up resources for IT pros during the summer? |
WhatsApp Blocks Links to Telegram Messenger (Its biggest Competitor) |
WhatsApp collects phone numbers, call duration, and a lot of metadata |
WhatsApp collects phone numbers, call duration, and more! |
When a 'Hacker News' Reader Tricked Me into visiting this Amazing Site (Don't Click at Work) |
When hacking saves lives: Hacking medical devices and implants |
When it comes to breaches, time is the biggest challenge |
When working is more than just business |
Which Android smartphones are most secure? |
White House Says No Thanks to Snowden Pardon Petition |
White House Support for CISA Worries Privacy Advocates |
Whitepaper - Breach Response: How to Prepare for the Inevitable |
Whitepaper: 10 key questions to ask when selecting a cloud service |
Whitepaper: 10 things your next firewall must do |
Whitepaper: 5 ways to take a collaborative approach to IT security |
Whitepaper: Anatomy of a Healthcare Data Breach |
Whitepaper: Cyber Security Best Practices |
Whitepaper: Using micro-segmentation to make cybersecurity work |
Who fixes the most vulnerabilities? |
Who is behind the hack of Uber’s driver database? |
Who is the unknown buyer that bought Adblock Extension |
Who planted the backdoors in Juniper's firewalls? |
Who planted the Juniper ScreenOS Authentication Backdoor? |
Why background screening is vital for IT security |
Why enterprise security priorities don't address the most serious threats |
Why improving cyber resilience is key |
Why parents must teach their children about internet security |
Why Ransomware Will Continue to Rise in 2015 |
Wi-Fi HaLow to extend Wi-Fi solutions for the Internet of Things |
WiFi jamming attacks more simple and cheaper than ever |
WiFi jamming, too easy and cheap to run attacks |
WikiLeaks obtains CIA Director's Hacked Emails and Plans to Publish them Shortly |
WikiLeaks publishes documents stolen from CIA director's email account |
WikiLeaks publishes reports showing NSA spied on French presidents |
Wikileaks releases CIA Director John Brennan emails |
Will 2016 be the year of the 100G network? |
Will 2016 mark the end of the Advanced Persistent Threat? |
Will the 2016 US presidential campaign get hacked? |
WIN $1 Million Bounty For Hacking the New iOS 9 iPhone |
Windows 10 Upgrade Become More Creepy, No Option to Opt-Out |
Windows 10 Upgrade Spam Carries CTB-Locker Ransomware |
Windows Bitlocker disk encryption could be easily bypassed |
Windows Live ID scam targets personal information |
Windows machines stop trusting Dell's two unconstrained root CA certs |
Windows Phone hacked with Windows Phone Internals |
WinRAR zero-day open million users to hack |
With Its First Android app, Apple tried to Kill Android Community, But Failed Badly! |
With unprotected keys and certificates, businesses lose customers |
Women represent only 10% of the infosec workforce |
WordPress 4.2.4 fixes critical vulnerabilities |
WordPress Patches Critical XSS Vulnerability in All Builds |
WordPress Patches Serious Shortcodes Core Engine Vulnerability |
WordPress Security: Brute Force Amplification Attack Targeting Thousand of Blogs |
World's 9 Biggest Banks to adopt Bitcoin's Blockchain Technology |
Worldwide IT spending to decline 5.5 percent in 2015 |
Would Encryption Backdoor Stop Paris-like Terror Attacks? |
WP Engine breached, forces users to change their passwords |
Writing Advanced OS X Malware an ‘Elegant’ Solution to Improving Detection |
X |
xboxlive digital certificate exposed opens users to MITM attacks |
XCodeGhost Attack – Is Apple’s Biggest Hack Ever linked to the US Intelligence? |
XcodeGhost iOS Malware Contained |
Xen Patches VM Escape Flaw |
Xen Project plugs critical host hijacking flaw, patch ASAP |
XOR DDoS botnet launching attacks from compromised Linux machines |
XSS, SQLi bugs found in several Network Management Systems |
Y |
Yahoo Hires Bob Lord as its CISO |
Yahoo open-sources Gryffin, a large scale web security scanning platform |
Yahoo to Warn Users of State-Sponsored Attacks |
Yahoo touts Úspěch Bug Bounty Programu |
Yahoo! Launches Free Web Application Security Scanner |
YiSpecter — First iOS Malware that Attacks both: Non-jailbroken and Jailbroken Devices |
YiSpecter iOS Malware Abuses Apple Enterprise Certs to Push Adware |
YiSpecter iOS Malware can infect any Apple iOS device |
You can buy a Cryptolocker/Cryptowall Ransomware Kit for $3,000 |
You can Hack into a Linux Computer just by pressing 'Backspace' 28 times |
You Can Hack Your Own Car — It's Legal Now |
You can’t be invulnerable, but you can be well protected |
You need just $8,000 to exploit a zero-day in a critical infrastructure |
You’re Paying for Your Starbucks, One Way or the Other |
Your GPS Location and Calls Can be Spied Using Network Vulnerability |
Z |
Zero Day in Android’s Google Admin App Can Bypass Sandbox |
Zero knowledge proof as an enabler for Cyber weapon information sharing |
Zero Trust approach to network security |
Zero-day disclosure-to-weaponization period cut in half |
ZeroDB, the end-to-end encrypted database, goes open source |
Zerodium Hosts Million-Dollar iOS 9 Bug Bounty |
Zerodium offers $100,000 for bypass Flash Player heap isolation |
Zerodium Offers $100,000 for Flash Zero-Day Exploit that Bypasses Mitigations |
Zerodium price list for secret Hacking methods |