Datum | Název | Kategorie |
| (IN)SECURE Magazine | Magazine |
| Phishing campaign leveraging on Dropbox targets Hong Kong media | Phishing |
| The US military is still sending un-encrypted emails | Kryptografie |
17.9.2015 | SYNful Knock: Backdoor Malware Found in Cisco Routers | Virus |
10.8.2015 | "Certifi-Gate" Android Vulnerability Lets Hackers Take Complete Control of Your Device | Android |
8.5.2017 | "Fatboy" Ransomware-as-a-Service Sets Ransom Based on Victim Location | Ransomware |
2.5.2017 | "Malware Hunter" Helps Researchers Find C&C Servers | Virus |
9.5.2017 | #MacronLeaks metadata suggests Russian threat actors behind Macron’s hack | |
| #opKKK Anonymous denied involvement in recent leak | Hacking |
| #OpNimr Anonymous targets Saudi websites to stop al-Nimr’s crucifixion | Security |
| #ParisAttacks — Anonymous declares War on ISIS: 'We will Hunt you Down!' | ISIS |
| $103,000 stolen in Brain Wallets cracking attacks | Security |
| $17 smartwatch includes a backdoor in the pairing app | Security |
| (IN)SECURE Magazine issue 46 released | Magazine |
| (IN)SECURE Magazine issue 47 released | Magazine |
| (IN)SECURE Magazine issue 48 released | Magazine |
| .onion officially registered as special-use domain name by the IETF | |
| @FFD8FFDB Twitter bot spies on poorly configured cameras | Social site |
| ‘In Our Sites’ Operation seized 999 websites offering counterfeit goods | Hacking |
| ‘Prohibition Era’ Of Security Research May Be Ahead | |
| ‘Software Liability Is Inevitable’ | |
| 0-days found in widely used Belkin router, fixes still unavailable | |
| 0xHACKED: Brown University Accounts Distributing Phishing Emails | Security |
| 1 in 4 organizations have experienced an APT | |
| 10 tips to help organizations stay secure this holiday season | |
| 10% of enterprises have at least one compromised device | |
| 100,000 laptops and phones left in UK bars each year | |
10.9.2015 | 11 Million Ashley Madison Passwords Cracked In Just 10 Days | Hacking |
| 11 zero-days uncovered in Samsung Galaxy S6 Edge | |
| 13 million MacKeeper users exposed in data breach | |
| 13 Million MacKeeper Users Hacked — 21 GB of Data Exposed | Hacking |
| 130 Celebrities' Email Accounts Hacked; Hacker Stole Movie Scripts and Sex Tapes | REPORTS |
| 137 major incidents disrupted EU telephony and Internet access in 2014 | |
| 15-year-old Boy Arrested in connection with TalkTalk Cyber Attack | Hacking |
| 15-Year-Old has been identified and arrested for TalkTalk Attack | Hacking |
| 15-year-old Teenage Hacker Arrested Over FBI Computer Hack | Hacking |
| 18,000 Android Apps include SMS stealing Library | Android |
| 191 Million US Voters' Personal Info Exposed by Misconfigured Database | Security |
| 19-Year-Old Teen Steals $150,000 by Hacking into Airline's Website | Crime |
| 1-Click Way to Check If your Android Device is Vulnerable to Hacking | Android |
| 200 Million WhatsApp Users Vulnerable to vCard Vulnerability | Vulnerebility |
9.9.2015 | 200 Million WhatsApp Users Vulnerable to vCard Vulnerability | Vulnerebility |
| 200,000 Comcast login credentials available on the Dark Web | Security |
| 2015 Cost of Cyber Crime Study | |
| 2015 saw 888 data breaches, 246 million records compromised worldwide | |
| 250+ iOS apps offered on Apple's App Store found slurping user data | |
| 26 vulnerabilities found in parental monitoring application | |
| 26-Year-Old Hacker Sentenced to Record 334 Years in Prison | Hacking |
| 27% of all detected malware appeared in 2015 | Virus |
| 3 OEMs Vulnerable To 3 Vulnerabilities. Your PCs At Risk | Vulnerebility |
| 33 percent of all HTTPS websites open to DROWN attack | Computer attack |
| 3G/4G cellural USB modems are full of critical security flaws, many 0-days | |
| 3G/4G modems continue to be vulnerable | Vulnerebility |
| 3-in-1 solution for enterprise management of privileged accounts and info | |
| 4 in 10 midsize businesses have experienced a data breach | |
| 40% of companies expect a data breach next year | |
| 49 new Regin backdoor modules discovered | |
| 49 suspected members of cybercriminal group arrested in Europe | |
| 5 Guidelines in Battling Cyber Criminals Over Precious Business Data | Crime |
| 5 reasons Security Congress is the (ISC)2 member event of the year | |
| 5.6 Million Federal Employees' Fingerprints Stolen in OPM Hack | Crime |
| 5.6 Million Fingerprints Stolen In OPM Hack | |
| 500 million users at risk of compromise via unpatched WinRAR bug | |
| 6.4 billion connected things will be in use in 2016 | |
| 600TB of data exposed due to misconfigured MongoDB instances | |
| 602 Gbps! This May Have Been the Largest DDoS Attack in History | Computer attack |
| 63% in favor of encryption backdoors to respond to national security threats | |
| 65,000+ Land Rovers recalled due to software bug | |
| 7 key global DDoS trends revealed | |
| 7 years of Android: A painful journey to world dominance | Android |
| 70% of breaches are detected by a third-party | |
| 74% organizations think they will be hit by an APT in the near future | Security |
| 75% of companies experienced a fraud incident in the past year | |
| 8 key online fraud behaviors and patterns | |
| 81% of healthcare organizations have been compromised | |
| 86% of PHP-based apps contain at least one XSS vulnerability | |
| 86.2 million phone scam calls delivered each month in the U.S. | |
| 87% of Android smartphones are insecure and that’s no joke | Android |
| 88 percent of company networks vulnerable to privileged account hacks | REPORTS |
| 88% of Android devices vulnerable due to slow patch management | Android |
| 90% of companies benefit from Big Data | |
| 90% of directors believe regulators should hold firms liable for hacks | |
| 90% of large businesses in the UK experienced data breach | Security |
| 9271 crucial vulnerabilities found in 185 firmware images of embedded devices | |
| 95% of websites in 10 new TLDs are suspicious | |
| A billion Android devices vulnerable to Stagefright 2.0 bugs | Android |
| A critical RCE flaw in Intel Management Engine affects Intel enterprise PCs dates back 9 years | |
| A day attack with DDoS booter cost $60 and can cause $720k in damage | Computer attack |
| A DHS report confirms the use of BlackEnergy in the Ukrainian outage, still unknown its role | Hacking |
| A few hours the Paris attacks, a new ISIS propaganda hub appeared on the Darknet | ISIS |
| A flaw in CISCO Universal Small Cell allows firmware retrieval | Vulnerebility |
| A flaw in D-Link Switches opens corporate networks to hack | Vulnerebility |
| A flaw in TeslaCrypt ransomware allows file recovering | Virus |
| A FOP data dump leaked online, 2.5GB of police contracts and data | Security |
| A Fourth Teenager was arrested over TalkTalk data breach | Hacking |
| A fundamental shift in security spending | |
| A Jihadi Help Desk assists ISIS terrorists and sympathizers with encryption? | |
| A journalist has been hacked on a plane while writing an Apple-FBI story | Apple |
| A look at North Korea’s ‘paranoid’ Red Star OS computer operating system | OS |
| A new Drydex campaign targeted British businesses | Virus |
| A new emergency patch for Adobe Flash Zero-Day, update your system! | Vulnerebility |
| A new person is leaking confidential documents on the US drone wars | Security |
| A new wave of attacks linked to the Codoso ATP Group | Computer attack |
| A new, streamlined version of Cryptowall is doing rounds | |
| A replica of AlphaBay market used to steal login credentials | Security |
| A research team has found two flaws in the OAuth 2.0 protocol | Vulnerebility |
| A secret cellphone spying devices catalog leaked online | Hardware |
| A serious issue in Steam allowed access to other users’ accounts | Hacking |
| A severe flaw in OpenSSL allows hackers to decrypt HTTPS traffic | Hacking |
| A severe vulnerability affects eBay, be careful to phishing attacks | Computer attack |
| A slew of LTE 4G vulnerabilities endanger Android users and mobile carriers | |
| A software bug caused the early release of 3,200 US prisoners | Vulnerebility |
| A sophisticated variant of OceanLotus trojan targets OS X systems | Apple |
| A Step-by-Step Guide — How to Install Free SSL Certificate On Your Website | Security |
| A Turkish hacker scores a record jail sentence of 334 years | Hacking |
| A well-funded cyber criminal group targets Asian organizations | Hacking |
| A XSS may have exposed users of the eBay website to phishing attacks | Computer attack |
| A young hacker violated the CIA Director’s private AOL email | Hacking |
| Abysmal security practices by toy maker VTech result in massive data breach | |
| Access Private Photos and Contacts Without a Passcode on iOS 9 devices | Apple |
| Account recovery via secret questions is a bad idea | |
| Actor using Angler exploit kit switched to Neutrino | Hacking |
| AdBlock Extension has been Sold to an 'Unknown Buyer' | Technologies |
| Admedia attacks now rely also on Joomla to serve ransomware | Virus |
| Adobe fixes critical and important flaws in Flash Player and Experience Manager | |
| Adobe fixes dozens critical vulnerabilities in Flash Player | Vulnerebility |
| Adobe Flash Update Includes Patches for 17 Vulnerabilities | |
| Adobe Hotfix Patches XXE Vulnerability in ColdFusion | |
| Adobe Patches 23 Critical Vulnerabilities in Flash Player | |
| Adobe Patches 69 Vulnerabilities in Reader, Acrobat, Flash | |
| Adobe Patches Flaws in Flash Player, Experience Manager | |
| Adobe patches Hacking Team Flash zero-days, update immediately! | |
| Adobe Patches Two Shockwave Player Vulnerabilities | |
| Adobe Patches XXE Vulnerability in LiveCycle Data Services | |
| Adobe Releases 23 Security Updates for Flash Player | Vulnerebility |
| Adobe to Kill 'FLASH', but by Just Renaming it as 'Adobe Animate CC' | Security |
| Adobe to Patch Reader and Acrobat Next Week | |
| AdobeWorkgroupHelper 2.8.3.3 - Stack Based Buffer Overflow | |
| Advantech Clears Hard-Coded SSH Keys from EKI Switches | |
| Adware installer gives itself permission to access Mac users' keychain | |
| Aerospace Probes released to stratosphere for spying weapons | Technologies |
| Aethra botnet made up of 12000 Italian devices threatens businesses | Security |
| After two fixes, OAuth standard deemed secure | |
| Aggressive Android ransomware spreading in the USA | Android |
| Aggressive tactics from DD4BC extortionist group revealed | |
| AirDrop Bug in Apple iOS and OSX allows Hackers to Install Malware Silently | Apple |
| Akamai and Trustwave unite to protect businesses from online threats | |
| ALERT: This New Ransomware Steals Passwords Before Encrypting Files | Virus |
| AlienSpy RAT Resurfaces as JSocket | |
| AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1 | Hardware |
| All BBC Websites went down after a major DDoS attack | Hacking |
| All Versions of Windows affected by Critical Security Vulnerability | Vulnerebility |
| Alleged LulzSec member claims responsibility for the DDoS on TalkTalk | Hacking |
| Allegedly 40 apps on App Store are infected | Apple |
| Amaq, the new ISIS Android App for secure communications | ISIS |
| Amazon Inspector Addresses Compliance and Security Challenge | |
| Amazon launches AWS web application firewall | |
| Amazon resets customers' potentially compromised passwords | |
| Amazon used as bait | Security |
| America’s Thrift Stores breached by Eastern European criminals | |
| An Amazon employee became owner of Google.com for a few minutes | Technologies |
| An Army of Thousands of Hacked Servers Found Mining Cryptocurrencies | |
| Analytics services are tracking users via Chrome extensions | |
| Analyzing Ransom32, the first JavaScript ransomware variant | Virus |
| Anarchist operation, US and UK spied on Israeli UAVs and fighter jets | Cyber Attack |
| and the most sophisticated Android malware ever exposed | |
| Android 5 bug allows attackers to easily unlock password-protected devices | |
| Android adware tricks users into giving it power to secretly download other apps | |
| Android banking malware SlemBunk continues to evolve | Android |
| Android factory reset not enough to keep data secure | |
| Android ransomware gets new, professional look thanks to Google’s Material Design | Android |
| Android ransomware masquerades as Adult Player app, takes photo of victim | Android |
| Android smartphones | |
| Android Stagefright Exploit Code Released | Android |
| Android Stagefright Exploit Code Released to Public | |
| Android Tablets with Pre-loaded Cloudsota malware sold on Amazon | Android |
| Android users rejoice! Security updates will be coming out faster | |
| Android’s Vampire Bat Apps are listening to your life through ultrasonic beacons | |
| Angler EK exploits recently patched IE bug to deliver ransomware | Virus |
| Angler exploit kit includes the code of a recent Flash flaw | Security |
| Anonymous Declares War On Donald Trump — #OpTrump | Cyber Attack |
| Anonymous goes after ISIS, aims to expose recruiters and sympathizers | |
| Anonymous Group Leaks Identities of 1000 KKK Members | Security |
| Anonymous hacked the France’s Ministry of Defense portal CIMD (Centre d’Identification des Materiels de la Defense) | Hacking |
| Anonymous Hackers to Leak 1000 of KKK Members Details on Million Mask March (Nov 5, 2015) | Hacking |
| Anonymous Hacking Group Takes Down 20,000 ISIS Twitter accounts | ISIS |
| Anonymous has taken down 5,500 ISIS accounts | ISIS |
| Anonymous leaked 18GB of data belonging to the Turkish national police | Hacking |
| Anonymous Took Down 20,000 pro-ISIS Twitter accounts | ISIS |
| Anonymous took down several government websites of Saudi Arabia | Hacking |
| Anonymous will reveal names of about 1,000 KKK members | Hacking |
| Another computer system at the Pentagon has been hacked | Hacking |
| Another ISIS Hacker Killed by U.S Drone Strike in Syria | ISIS |
| Another Magento Remote Code Execution Vulnerability | Vulnerebility |
| Another root CA cert with key found on Dell's machines | |
| Another teenager arrested in connection to TalkTalk hack | |
| Anti-IS group ‘New World Hackers’ claims BBC website attack | ISIS |
| Antiquated environment and bad security practices aided OPM hackers | |
| API security becoming a CXO level concern | |
| Appeals Court Vacates Lower Court’s Decision on National Security Letters | |
| Apple Addresses Dozens of Vulnerabilities, Embraces Two-Factor Authentication in iOS 9 | Apple |
| Apple App Store suffers its first large-scale attack | Apple |
| Apple Boosts iOS 9 Security with improved Two-Factor Authentication | Apple |
| Apple boots some ad blockers from App Store to protect users' privacy | Apple |
| Apple can access your encrypted iMessages | Apple |
| Apple Can Still Read Your End-to-End Encrypted iMessages | Apple |
| Apple complicates app sideloading in iOS 9 for increased security | Apple |
| Apple confirms Judge unlock a new iPhone is not possible | Apple |
| Apple Could Offer iMessage App for Android | Apple |
| Apple fixes a bucketload of vulnerabilities in everything | Apple |
| Apple fixes serious flaws in the Productivity Apps | Apple |
| Apple Gatekeeper Bypass Opens Door for Malicious Code | Apple |
| Apple Goes All-In on Privacy | Apple |
| Apple has several apps from the official iOS App Store | Apple |
| Apple hires developer of World's Most Secure Messaging App | Apple |
| Apple iOS 9.0.2 Update Patches Lock Screen Bypass Exploit | Apple |
| Apple iOS Jailbreak Tweaks Have Backdoors; 220,000 iCloud Accounts Hacked | Apple |
| Apple is working on New iPhone Even It Can't Hack | Apple |
| Apple Kicks Out some Malicious Ad-Blocker Apps from its Online Store | Apple |
| Apple Mac OS X Hits by Two Unpatched Zero-day Flaws | Apple |
| Apple Patches 100+ Vulnerabilities in OS X, Safari, iOS | Apple |
| Apple Patches Critical OS X DYLD Flaw in Monster Update | Apple |
| Apple patches serious remotely exploitable iTunes and App Store flaw | Apple |
| Apple pushes out critical security updates for OS X, iOS, watchOS, and other products | Apple |
| Apple releases OS X El Capitan, patches passcode loophole in iOS | Apple |
| Apple releases security updates for every major product | Apple |
| Apple Removes Apps That Expose Encrypted Traffic | Apple |
| Apple removes hundreds of malicious apps after major malware attack | Apple |
| Apple to Built Fuel Cell Battery that Could Power iPhones and Macbooks for Weeks | Apple |
| Apple to Remove 256 iOS Apps Using Private APIs, Collecting Personal Data | Apple |
| Apple told Judge: It's Impossible to Access Data on Locked iPhones | Apple |
| Apple vs. FBI — Google Joins Tim Cook in Encryption Backdoor Battle | Apple |
| Apple watchOS2 Includes Host of Code-Execution Patches | Apple |
| Apple Zero Day Remains Unpatched | Apple |
| Apple's Biggest Hack Ever: 4000 Malicious iOS Store Apps Linked to CIA? | Apple |
| Apple's Mac OS X Still Open to Malware, Thanks Gatekeeper | Apple |
| Apple's Swift programming language is now open source | Apple |
| Approximate machine improves the Bitcoin mining by 30 percent | Technologies |
| APT Group Gets Selective About Data it Steals | APT |
| APT Groups don’t go under the grid after a successful attack! | APT |
| APT Trends report, Q1 2017 | APT |
| APT-style bank robberies increase with Metel, GCMAN and Carbanak 2.0 attacks | APT |
| Arabian tales by ‘Nigerians’ | Security |
| Are IT pros overconfident in their ability to deflect attacks? | |
| Are IT security pros optimistic or naïve? | |
| Are Russian hackers infecting critical infrastructure in Ukraine? | Cyber Attack |
| Are we putting our finances at risk with our online shopping and banking? | Security |
| Are you ready for EMV? | |
| Are you searching for a Facebook Hacking Tool? Be careful! | Social site |
| Are your competitors organizing DDoS attacks against you? | |
| Ashley Madison hacked, info of 37 million users stolen | |
| Ashley Madison Hacker – An Insider Woman Employee? | Hacking |
| Ashley Madison-themed blackmail, data deletion scams hitting inboxes | |
| Assassins in the darkweb, “Service catalogue” and Price list” updated | Hacking |
| Asus Faces 20 years of Audits Over Poor Wi-Fi Router Security | Hardware |
| Asus Patches Vulnerabilities in RT Routers | Vulnerebility |
| AT&T Facilitated NSA Surveillance Efforts, Reports | NSA |
| ATMZombie: banking trojan in Israeli waters | Virus |
| ATP group uses Word Docs to drop BlackEnergy Malware | Virus |
| Attack code for critical Android Stagefright flaw published | |
| Attack on Zygote: a new twist in the evolution of mobile threats | Mobil |
| Attacker Compromised Mozilla Bug System, Stole Private Vulnerability Data | |
| Attackers actively exploiting Windows bug via malicious USB devices | |
| Attackers Can Use SAP to Bridge Corporate, Operational ICS Networks | |
| Attackers can use Siri, Google Now to secretly take over smartphones | |
| Attackers compromise Cisco Web VPNs to steal login credentials, backdoor target networks | |
| Attackers Embracing Steganography to Hide Communication | |
| Attackers hack into Outlook Web App (OWA) Server for access to organization network | Computer attack |
| Attackers posing as legitimate insiders still an enormous security risk | |
| Attackers prefer lower-bandwidth DDoS attacks | |
| Attackers Replacing Firmware on Cisco Routers | |
| Attackers take over org's OWA server, harvest domain credentials with malicious DLL | |
| Attackers use Google Drive, Dropbox to breach companies | |
| Attacking Diffie-Hellman protocol implementation in the Angler Exploit Kit | Exploit |
| Audit shows Department of Homeland Security 6 billion U.S. Dollar firewall not so effective against hackers | Security |
| Australian NSW Government Department of Resources and Energy under attack. Is it Chinese cyber espionage? | Security |
| Authentication bypass flaw in Netgear SOHO routers exploited in the wild | |
| Author of the Angler EK integrated recently Silverlight exploit | Virus |
| Authorities Take Down Darknet Marketplace | |
| Authors digitally signed Spymel Trojan to evade detection | Virus |
| AutoIt Used in Targeted Attacks to Move RATs | Virus |
30.8.2015 | Automating Metrics using RTIR REST API | |
| AVG Antivirus Plans to Collect & Sell Your Personal Data to Advertisers | Security |
| AVG will sell user browsing and search info to advertisers | |
| AVG, McAfee, and Kaspersky antivirus were vulnerable to critical flaw | Vulnerebility |
| AV-Test – Which is the best Antivirus for Linux systems? | Virus |
| AV-TEST 2015 AWARDs – Which is the best antivirus solutions? | Security |
| Back to the Future: How much of Marty and Docs' tech is a reality? | |
| Backdoor In A Backdoor Identified in 600,000 Arris Modems | |
| Backdoor in Baidu Android SDK Puts 100 Million Devices at Risk | Android |
| BackStab Malware steals iOS and BlackBerry Backups | Virus |
| Bad actors target entities worldwide via Cisco WebVPN | Hacking |
| Bad Santa! Microsoft Offers — 'Upgrade now' or 'Upgrade tonight' to Push Windows 10 | Security |
| BadBarcode: Poisoned barcodes can be used to take over systems | |
| Banking Malware Moving Over Facebook Hosted in Cloud | |
| Bartalex Variants Spotted Dropping Pony, Dyre Malware | |
| Be careful Facebook users, you are under attack! | Computer attack |
| Be careful, opening crashsafari.com your mobile will crash | Apple |
| Beaches, carnivals and cybercrime: a look inside the Brazilian underground | Crime |
| Behind the scenes at BruCON, a European hacker conference | |
| Belkin's N150 router sports multiple flaws, including default access credentials for telnet server | |
| Beware Coffee Lovers! StarBucks Exposed you to 3 Critical Vulnerabilities | Vulnerebility |
| Beware fake LinkedIn profiles, threat actors are using them to hack you | Social site |
| Beware of Apple-themed phishing emails threatening to limit your account | |
| Beware of Backdoored Linux Mint ISOs | Hacking |
| Beware! Don't Fall for FireFox "HoeflerText Font Wasn't Found" Banking Malware Scam | |
| Beware, connected ikettles can leak WiFi passwords | Security |
| Big Data investments on the rise | |
| Bitcoin Core Developers Quit Bitcoin Project to Launch a New Digital Currency | Security |
| Bitcoin Creator 'Satoshi Nakamoto' Unmasked! An Australian Man 'Craig Wright' identified... | Technologies |
| Bitcoin Extortionist Copycats on the Rise, Experts Say | |
| Bitglass granted patent on searchable cloud encryption | |
| BitKangoroo Ransomware Deletes User Files | Ransomware |
| BitTorrent clients can be made to participate in high-volume DoS attacks | |
| BitTorrent Fixes Reflective DDoS Attack Security Flaw | Computer attack |
| Black Friday and Cyber Monday, Keep Yourself Safe | Hacking |
| Black marketplace – 50c buys login for stolen media accounts | Hacking |
| BlackEnergy APT Attacks in Ukraine employ spearphishing with Word documents | Security |
| BlackEnergy infected also Ukrainian Mining and Railway Systems | Virus |
| BlackEnergy targets Ukrainian news media and electric industry | Virus |
| Blackhole Exploit Kit Resurfaces in the wild | Hacking |
| Blackmoon Banking Trojan Continues to Target South Korea | |
| BLEKey Device Breaks RFID Physical Access Controls | |
| Blockchain transactions create risks for financial services | |
| Bogus PayPal App used to spread a banking Trojan | Virus |
| Botnet of Thousands of Servers Mines for Crypto-Currency | |
| Brain's reaction to certain words could replace passwords | |
| Breaches might be inevitable, but penalties are not harsh enough | |
| Breaking — India Bans Facebook's Free Basics Service | Social site |
| British Gas customers’ data posted online, 2,200 records exposed | Hacking |
| British Intelligence Agency Can Hack Any Smartphone With Just a Text Message | Hacking |
| British Intelligence Open-Sources its Large-Scale Graph Database Software | NSA |
| British NCA revealed to have hacking abilities, aka equipment interference | Hacking |
| British-born ISIS Hacker Killed in US Drone Strike in Syria | ISIS |
| Brute-Force amplification attacks on WordPress rely on XML-RPC | Computer attack |
| Bug hunting without much tech knowledge or many tools | |
| Bug in Android Gmail app allows effective email spoofing | |
| Bug in Gmail app for Android Allows anyone to Send Spoofed Emails | Vulnerebility |
| Bug in OS X Yosemite allows attackers to gain root access | |
| Bugs in Drupal's update process could lead to backdoored updates, site compromise | |
| Bugzilla CVE-2015-4499 flaw, be aware hackers could know all your bugs | Vulnerebility |
| Business email compromise (BEC), the 5 billion dollar scam | |
| Business email compromise scams still happening, still successful | |
| Business leaders increasingly drive cloud migration | |
| Businesses know about POS security risks, but are they investing wisely? | |
| Businesses Using Millions of insecure SHA-1 Certificates | Security |
| Bye bye, Flash! Google to Ban Flash-based Advertising | Security |
| Bypass Developed for Microsoft Memory Protection, Control Flow Guard | |
| Cadelle and Chafer, Iranian hackers are tracking dissidents and activists | Hacking |
| Can an inevitable evil be conquered? | Technologies |
| Can organizations hold back the tide of cloud adoption? | |
| Can Scientists 'Upload Knowledge' Directly into your Brain to Teach New Skills? | Security |
| Canada – Military data found in hard drive at the recycling depot | Security |
| Canceled Talk Re-Ignites Controversy Over Legitimate Security Research | |
| Car Hacking Gets the Attention of Detroit and Washington | |
| Car hacking via compromised car diagnostic tools | |
| Carbanak gang is back and packing new guns | APT |
| Carbanak gang makes the headlines again, hackers refined intrusion tactics | |
| Carbanak Hackers Refine Intrusion Tactics | |
| Carbanak Hackers Use Shims for Process Injection, Persistence | |
| Card Breach at Hilton Hotel Properties Under Investigation | Crime |
| Casino Sues Cyber Security Company Over Failure to Stop Hackers | Security |
| Caution! Hackers Can Easily Hijack Popular Baby Monitors to Watch Your Kids | Hacking |
| Caution, Hackers targeted the cPanel Database | Hacking |
| CDNetworks to showcase Cloud Security 2.0 at Black Hat USA 2015 | |
| Census Bureau Says Breach Didn’t Compromise Sensitive Data | |
| CenterPOS – The evolution of POS malware | Virus |
| Central Shop, the evolution of credit card black markets | Security |
| CERT Warns of Hard-Coded Credentials in DSL SOHO Routers | Hardware |
| CERT Warns of Slew of Bugs in Belkin N600 Routers | |
| CFOs are not confident about their level of security | |
| CIOs agree, IT is more complex than ever | |
| CISA Passes Senate, criticism about privacy and security | Security |
| Cisco finds, removes more default SSH keys on its software | |
| Cisco fixes a critical flaw in CISCO CVR100W Wireless-N VPN Small Business Routers | |
| Cisco fixes Command Injection vulnerability in CISCO ACE 4710 products | Vulnerebility |
| Cisco Fixes DoS Vulnerability in ASR 1000 Routers | |
| Cisco Industrial switches affected by an unpatched flaw | Vulnerebility |
| Cisco Jabber flaw allows MitM attackers to wiretap communications | |
| Cisco patched CVE-2017-3881 IOS XE Vulnerability leaked in CIA Vault 7 Dump | |
| Cisco Patches CIA Zero-Day Affecting Hundreds of Switches | |
| Cisco Patches Critical Flaw in Small Business Router | |
| Cisco Patches Denial-of-Service, Bypass Vulnerabilities in IOS | Vulnerebility |
| Cisco Patches File Overwrite Bug in IMC Supervisor and UCS Director | |
| Cisco released a tool to scan for SYNful_Knock implants | Security |
| Cisco squashes DoS bug in its unified infrastructure software | |
| Cisco Systems will be auditing their code for backdoors | |
| Cisco Takes Down Ransomware Operation Generating $30 Million in Revenue For Hackers | Virus |
| Cisco Warns Customers About Attacks Installing Malicious IOS Bootstrap Images | Virus |
| Cisco wireless points include hardcoded passwords | Hardware |
| CISO at U.S. Bank offers tips for secure online purchasing | |
| CISOs are looking for more integration and automation | |
| Citovat Wassenaar, HP vytáhne z Mobile Pwn2Own | |
| Civil nuclear facilities worldwide at risk of cyber attack | Cyber Attack |
| Clash of Greed | |
| Class Action Suit Against Neiman Marcus Over Data Breach Revived | |
| Clever Android ransomware infects tens of thousands of devices | Ransomware |
| Clickjacking Campaign exploits the European Cookie Law | Security |
| Click-Malware Podvod Šíøení pøes JavaScript Pøílohy | |
| Cloud encryption and tokenization trends in financial services | |
| Cloud-based solutions that protect against zero day attacks | |
| Cloud-based vulnerability management: Top vendors in the field | |
| Cloudflare Launches Service to Protect IoT Devices | |
| Cloud-Hosted Botnet Controllers on the Rise: Report | |
| Code Signing certificates becoming popular cybercrime commodity | Security |
| Coinvault, are we reaching the end of the nightmare? | Virus |
| Collision Attack: Widely Used SHA-1 Hash Algorithm Needs to Die Immediately | Computer attack |
| Comcast resets passwords for 200,000 users after login credentials go on sale | |
| Commercial code is more compliant to security standards than open source code | |
| Comodo Internet Security opened your PC to attackers | Security |
| Comodo Issues Eight Forbidden Certificates | |
| Comodo's so-called 'Secure Internet Browser' Comes with Disabled Security Features | Vulnerebility |
| Companies investing in cloud, security and Big Data are growing faster | |
| Companies leave vulnerabilities unpatched for up to 120 days | |
| Companies still lack security controls for accessing enterprise applications | |
| Complex security solutions are exposing companies to risk | |
| Compliance vs. cybersecurity: Insurers face competing priorities | |
| Compromising Macs with simple Gatekeeper bypass | |
| Conexant audio driver works as Built-in Keylogger feature in dozens HP devices | |
| Confidence in antivirus falls to all-time low | |
| Confusion about IT security leaves devices at risk | |
| Confusion regarding strategic defenses for network security | |
| Consent Control and eDiscovery: Devils in GDPR Detail | |
| Consumers expect businesses to be more transparent on how their data is used | |
| Consumers increasingly adopting personal security measures | |
| Container security concerns escalate | |
| Cops are turning to privately held DNA databases for info to help with investigations | |
| Core Infrastructure Initiative Launches Open Source Security Badge Program | Open source |
15.9.2015 | CoreBot Adds New Capabilities, Transitions to Banking Trojan | Virus |
| CoreBot Malware Steals Credentials-For Now | |
| Corporate networks can be compromised via Windows Updates | |
| Cost of Breaking SHA-1 decreases due to a new Collision Attack | Computer attack |
| Cox Communications to pay $595,000 for data breach | |
| Cracka hackers doxed more than 2,000 Government employees | Hacking |
| Cracka hackers who doxed CIA Chief, not hit the FBI Deputy Director | Hacking |
| Cracking WiFi Passwords By Hacking into Smart Kettles | Hacking |
| Cracks in the mobile ecosystem, Internet-connected devices | |
| Creator of MegalodonHTTP DDoS Botnet Arrested | Security |
| Credential manager system used by Cisco, IBM, F5 has been breached | |
| Criminals behind CryptoWall 3.0 Made $325 Million | Virus |
| Criminals hacked chip-and-PIN system by perfecting researchers' PoC attack | |
| Criminals, Linguistics, Literacy and Attribution | Crime |
| Critical Bugzilla flaw allows access to unpatched vulnerability information | |
| Critical Flaw Patched in Jenkins Automation Server | |
| Critical Flaws Found in NETGEAR Network Management System | Vulnerebility |
| Critical Flaws Found in Network Management Systems | |
| Critical Flaws in Magento leave Millions of E-Commerce Sites at Risk | Vulnerebility |
| Critical glibc Flaw Puts Linux Machines and Apps at Risk (Patch Immediately) | Vulnerebility |
| Critical Java Bug Extends to Oracle, IBM Middleware | |
| Critical Joomla RCE bug actively exploited, patch immediately! | |
| Critical Netgear Router Exploit allows anyone to Hack You Remotely | Vulnerebility |
| Critical OpenSSH Flaw Leaks Private Crypto Keys to Hackers | Vulnerebility |
| Critical OpenSSL Flaw Allows Hackers to Decrypt HTTPS Traffic | Vulnerebility |
| Critical 'Port Fail' Vulnerability Reveals Real IP Addresses of VPN Users | Vulnerebility |
| Critical RCE bug in FireEye's security appliances exploitable via email | |
| Critical RubyGems vulns can lead to installation of malicious apps | |
| Critical ScreenOS bugs allow undetectable decryption of VPN connections, device hijacking | |
| Critical vulnerabilities found in Honeywell Midas Gas Detectors | Vulnerebility |
| Critical Vulnerabilities in 3G/4G Modems or how to build Big Brother | Vulnerebility |
| Crooks are abusing Google Search Console to remain under the radar | Technologies |
| Crooks are offering Apple employees up to $23,000 for their login credentials | Apple |
| Crooks steal over $50 million from aircraft systems manufacturer FACC | Crime |
| Crooks stole €600,000 in MitM attacks on EMV Cards | Hacking |
| Crooks use the Nuclear Exploit Kit to serve CryptoWall 4.0 | Virus |
| Cross-device tracking via imperceptible audio beacons threatens user privacy | |
| Crypto e-mail provider ProtonMail pays ransom to stop DDoS attack, attack continues | |
| Crypto-ransomware encrypts files "offline" | |
| Cryptowall 4.0 comes from Russia, Bitdefender released a vaccine | Virus |
| CryptoWall 4.0 Released with a New Look and Several New Features | Virus |
| CryptoWall Ransomware raised $325 Million in Revenue for Its Developer | Virus |
| CSA releases tool for personal data legal protection | |
| CSRF Flaw Patched in Popular Spring Social Core Library | |
| CTB-Locker is back: the web server edition | Virus |
| CTB-Locker Ransomware Spreading Rapidly, Infects Thousands of Web Servers | Virus |
| CUJO: Plug-n-play protection for all devices | |
| Curbing the For-Profit Cybercrime Food Chain | |
| Custom Google App Engine Tweak Still Leads to Java Sandbox Escapes | |
| Custom secure apps are gaining popularity in the enterprise | |
| Customers of Japanese banks targeted by the Brolux Trojan | Virus |
| CVE-2015-8562 – 16,000 Daily Attacks on vulnerable Joomla servers | Vulnerebility |
| CVE-2016-0603 – Oracle Issues out-of-box Java emergency patch for Windows | Vulnerebility |
| Cyber attack grounds Polish LOT aeroplanes | |
| Cyber attack on US power grid could result in losses up to $1 trillion | |
| Cyber attack overall cost suffered last year by businesses is $315b | Security |
| Cyber Caliphate Hacks 54k Twitter accounts, including ones of CIA and FBI officials | Hacking |
| Cyber crooks abuse legitimate EU Cookie Law notices in clever clickjacking campaign | |
| Cyber crooks actively hijacking servers with unpatched vBulletin installations | |
| Cyber crooks opt for APT method for delivering malware | |
| Cyber defence is a profitable “Hamster Wheel” | Cyber Attack |
| Cyber insurance market to hit US$10 billion by 2020 | |
| Cyber liability insurance is becoming an increasing necessity | |
| Cyber risk still poorly communicated to C-suite executives | |
| Cyber security guidelines for the shipping industry | |
| Cyber spies of the Sofacy APT increased its operations tenfold | Hacking |
| Cyber Terrorists Can Get Their Hands on UK Infrastructure, Like the Net or Electricity | Security |
| Cyber warfare fears spur US Navy to teach celestial navigation again | |
| Cyberattacks will cost U.S. health systems $305 billion | |
| Cybercriminals are becoming more creative | |
| Cybercriminals are preying on existing vulnerabilities to plan future attacks | |
| Cybercriminals increasingly hunting down the money | |
| Cybercriminals to target new payment technologies | |
| Cyberespionage group exploits satellites for ultimate anonymity | |
| Cybersecurity expectations: Myth and reality | |
| Cybersecurity is being taken seriously around the globe | |
| Cybersecurity Operational Tests And Assessments – US Defence can’t check F-35 data due to insecure systems | Security |
| Cybersecurity strategies and the boardroom | |
| CyberSpace — China arrested Hackers at U.S. Government Request | Cyber Attack |
| Cyberspace Global Warming as a duality of Trajectories on cyberpolitics | Cyber Attack |
| Cyberspies Use KONNI Malware to Target North Korea | |
| Czech Court to Rule This Month on Extradition of Russian Hacker | |
| Damballa revealed the secrets behind the Destover malware that infected the Sony Pictures | Virus |
| Darkhotel APT Latest to Use Hacking Team Zero Day | |
| DarkHotel hackers are back targeting Chinese Telecom | Hacking |
| Darkhotel spying crew boosts attacks with Hacking Team exploit | |
| Darkode forum returns with lousy security that keeps serious users away | |
| Darkode forum was supposed to be resuscitated, but … | Security |
| Darkweb, a look back at 2015 events and 2016 predictions | Security |
| DARPA is working on ICARUS, the disappearing delivery drone | Technologies |
| DARPA Protecting Software From Reverse Engineering Through Obfuscation | |
| Data Breach Day — Patreon (2.3M), T-Mobile (15M) and Scottrade (4.6M) — HACKED! | Crime |
| Data breaches and bots are driving cybercrime surge | |
| Data breaches, stolen data and their sale in the Dark Web | Crime |
| Data dump points to a breach at Electronic Arts | |
| Data of 34,000 Steam users exposed due to buggy caching configuration | Security |
| Database of 70 million prisoner phone calls breached, leaked | |
| Database with 191 Million US voters’ personal data exposed online | Hacking |
| Dating scam package offered in the underground | Security |
| DDoS attack on BBC may have reached 602Gbps, never so powerful | Computer attack |
| DDoS attacks increase 180% compared to a year ago | |
| Deadly Simple Exploit Bypasses Apple Gatekeeper Security to Install Malicious Apps | Virus |
| Deadly Windows, Reader font bugs can lead to full system compromise | |
| De-anonymizing code authors by analyzing executable binaries | |
| Deep Web Search Engines to Explore the Hidden Internet | Security |
| Default Apache Configuration Can Unmask Tor Hidden Services | Security |
| Default conf on Apache Web servers can de-anonymize your hidden service | Security |
| Deleting WhatsApp Messages Before 90 Days Could Land you in Jail | Security |
| Dell puts users at risk with dangerous eDellRoot root certificate | Hacking |
| Dell shipped computers with root CA cert, private crypto key included | |
| Dell's Laptops are Infected with 'Superfish-Like' pre-installed Malware | Virus |
| Demand for new malicious programs reaches saturation point | |
| Dennis Fisher On Security, Journalism, and the Origins of Threatpost | |
| Deplorable Steam security flaw exploited to hijack prominent accounts | |
| Design Flaws Make Drones Vulnerable to Cyber-Attacks | Computer attack |
| Details Surface on Patched Bugzilla Privilege Escalation Flaw | |
| Details Surface on Patched Sandbox Violation Vulnerability in iOS | Vulnerebility |
| DHS Funds Smartphone Authentication Projects | |
| DHS Information Security Program, Dozens secret databases vulnerable to hack | Security |
| DHS Raises Privacy Concerns With Senate Cyber Threat Sharing Bill | |
| DHS working on ‘self-destructing’ security chip for smartphones | Hardware |
| DHS: Drug Traffickers are hacking surveillance drones on the border | Security |
| Did FBI pay the Carnegie Mellon to hack Tor? | Hacking |
| Did terrorists use PlayStation 4 for communications in Paris attacks? | ISIS |
| Digitally signed spam campaign spotted delivering malware | |
| Disbanding the ‘Zoo’ | Security |
| Disclosed Netgear Router Vulnerability Under Attack | Vulnerebility |
| Discover how many ways there were to hack your Apple TV | Hacking |
| Discovered a new DB containing more than 56 million records of US Voters | Hacking |
| Discovered an ISIL Bitcoin Address containing 3 Million dollars | ISIS |
| Disgusting! Ashley Madison was Building an App – 'What's your Wife Worth?' | Hacking |
| Distrust in use of personal data could hinder business growth | |
| D-Link accidentally leaks code-signing certs in its firmware | |
| D-Link Accidentally Leaks Private Code-Signing Keys | |
| D-Link Accidentally Publishes Its Private Code-Signing Keys on the Internet | Security |
| Dmail: A Chrome extension for sending self-destructing emails | |
| Do CEOs know enough about cyber security? | |
| Do CISOs deserve a seat at the leadership table? | |
| Do conventional security measures negatively impact productivity? | |
| Do security flaws with life-threatening implications need alternative disclosure? | |
| Do we need harsher penalties and enforced data breach detection measures? | |
| Do you have a Netgear ProSAFE NMS300? Here you are the exploit to hack it | Vulnerebility |
| Documents demonstrate NSA continued mass surveillance | NSA |
| Does Mr. Robot’s use real Hacking Tools? Which are? | News |
| Don’t set your iPhone’s Date to January 1, 1970 or your will brick it | Apple |
| Don’t throw away your old Boarding Pass, it may contain personal information | Security |
| Donald Trump — Boycott Apple! But Still Tweeting from an iPhone | Apple |
| Dow Jones & Company Latest Financial Firm Hit With Data Breach | |
| Dozens of games infected with Xiny available on the Google Play | Android |
| Dridex Banking Malware Back in Circulation | |
| Dridex Botnets are still active and effective | Virus |
| DropboxCache Backdoor, a new Cross-Platform threat | Virus |
| DROWN Attack — More than 11 Million OpenSSL HTTPS Websites at Risk | Computer attack |
| Drupal moves to fix flaws in update process | |
| Dutch Police Arrest Alleged CoinVault Ransomware Authors | |
| Dutch Police Training Eagles to Take Down Rogue Drones | Security |
| Duuzer Trojan: A New Backdoor Targeting South Korean Organizations | Virus |
| Duuzer, a data stealer Trojan targets South Korean organizations | Virus |
| Dyre crackdown, the biggest effort to date by Russian authorities against cybercrime | Virus |
| Dyreza Trojan Targeting IT Supply Chain Credentials | |
| Easily exploitable Certifi-gate bug opens Android devices to hijacking | |
| eBay Fixes XSS Flaw in Subdomain | |
| eBook: 5 Essential Steps to PCI DSS Compliance | |
| eBook: Cybersecurity for Dummies | |
| eBook: Fighting Known, Unknown, and Advanced Threats | |
| eBook: Website Security for Dummies | |
| eDiscovery - An Enterprise Issue That Can't be Ignored | |
| Edward Snowden to discuss privacy at IP EXPO Europe 2015 | |
| eFast browser deletes and replaces your Chrome Browser | Security |
| EFF delves into privacy practices of Apple, Google, Twitter, and others | |
| EFF Scoreboard – Secure Messaging, stay safe online | Security |
| EFF, AdBlock and Others Launch New Do Not Track Standard | |
| EFF: T-Mobile breaks neutrality rules with Binge On service | |
| EFF's Privacy Badger prevents users being tracked online | |
| Elasticsearch servers actively targeted by botmasters | |
| Email accounts belonging to 130 Celebrities have been Hacked | Hacking |
| Email is more secure today than it was two years ago | |
| Email Security Device "nomx" Has Serious Flaws: Researchers | |
| Embedded Devices Share, Reuse Private SSH Keys, HTTPs Certificates | |
| EMEA organizations are being pre-emptive about security | |
| Emergency Flash update plugs zero-day exploited in the wild | |
| Emergency IE Patch Fixes Vulnerability Under Attack | |
| Emergency Patch released for Latest Flash Zero-Day Vulnerability | Vulnerebility |
| Emergency. Hundreds of compromised WordPress sites serve TeslaCrypt ransomware | Virus |
| Employee credentials of half of European top 500 firms exposed online | |
| Employee Stole 'Yandex Search Engine' Source Code, Tried to Sell it for Just $29K | Security |
| Employee use of cloud services puts business data at risk | |
| ENCRYPT Act of 2016 — Proposed Bill Restricts States to Ban Encryption | Security |
| Encrypted Email Servers Seized by German Authorities After School Bomb Threats | Security |
| Encryption, Lock Mechanism Vulnerabilities Plague AppLock | |
| Endpoint security lags in spite of vulnerabilities | |
| Endress+Hauser Patches Buffer Overflow In Dozens of ICS Products | |
| End-to-end encrypted database ZeroDB is now open source | |
| Energy industry under unceasing attack in 2015 | Computer attack |
| Energy security pros: More competent, or just naive? | |
| Enhanced security for corporate information on mobile devices | |
| Enhanced security for corporate information on mobile devices | |
| ENISA Threat Landscape 2015, a must reading | Security |
| Entrust Datacard integrates with Citrix to enable secure anytime-anywhere productivity | |
| EPIC Fail — For the Third Time, Linux Ransomware CRACKED! | Virus |
| Espionage campaign relying on the Zeus Trojan targets the Israeli Public Sector | Virus |
| EU plans to ban Bitcoin to curb terrorism funding | Security |
| EU regulation to Impose rules on firms to improve cybersecurity | Cyber Attack |
| Europe Emerges as Major Source of Cyber Attacks: Reports | |
| European Aviation Agency Warns of Aircraft Hacking | Hacking |
| European Aviation Safety Agency – Airplane hacking is reality | Hacking |
| European credit card payment terminals are plagued with serious flaws | Vulnerebility |
| European data centre services provider Interxion suffers breach | |
| European law enforcement takes down Darknet marketplace | |
| European Parliament members want member states to protect Edward Snowden | |
| European Police Agencies declare war on DroidJack RAT | Virus |
| European police corps arrested operators behind darknets offering illegal products and services | Security |
| European Space Agency domains hacked by Anonymous | Hacking |
| Europe's new "net neutrality" regulation is full of loopholes | |
| Europol Probing IS Setting Up of Social Network | |
| Europol, a new EU counter terrorism centre opening this month | Security |
| Europol, a new move against terrorism and money laundering | Security |
| Evaluating the security of open source software | |
| Every Call You Make or Text You Send, They'll Be Tracking From Today | Security |
| Evolution and Escalation: Two Key Cyber Threat Trends | |
| Exabeam secures $25 million in Series B funding | |
| Existing security standards do not sufficiently address IoT | |
| Expedia users targeted by phisher who gained access to their info | |
| Experian Breach Spills Data on 15 Million T-Mobile Customers | |
| Experian Breach: 15 Million T-Mobile Customers' Data Hacked | Crime |
| Experian’s data breach puts 15 million T-Mobile users at risk | Crime |
| Expert discovered how to hack any Facebook account | Social site |
| Expert discovered online data belonging to the trading firm AMP | |
| Experts discovered the attack platform used by the Winnti Group | Virus |
| Experts warn Neutrino and RIG exploit kit activity spike | Virus |
| Exploit broker offers $1 million for reliable iOS 9 exploit | |
| Exploit kit activity up 75 percent | |
| Exploit Writing and Mitigation Going Hand in Hand | |
| Exploitable Details of Intel's 'Apocalyptic' AMT Firmware Vulnerability Disclosed | |
| Exploiting Browser Cookies to Bypass HTTPS and Steal Private Information | Computer attack |
| Exploring the North American cybercriminal underground | |
| Exposing cyberattacks targeting government networks in Southeast Asia | |
| Exposing fraud behavior patterns associated with compromised identities | |
| EZCast TV streaming stick leaves home networks vulnerable to attack | |
| Facebook Awards $100,000 for New Class of Vulnerabilities and Detection Tool | Social site |
| Facebook first discovered spear phishing attacks of Iranian hackers on State Department employees | Hacking |
| Facebook introduces end-to-end encryption for notifications | |
| Facebook is testing Self-Destructing Messages for Messenger App | Social site |
| Facebook M: Facebook's Answer to Siri, Cortana and Google Now | Technologies |
| Facebook Offering You $1000 to Run Advertisement Against Terrorism | Social site |
| Facebook slowly fine-tuning its popular ThreatExchange | |
| Facebook starts warning users of state-sponsored attacks against their accounts | |
| Facebook to Launch Its Own Satellite to Beam Free Internet | Technologies |
| Facebook tries to help advertisers and users with new ad control options | |
| Facebook Updates Information-Sharing Platform | |
| Facebook Will Now Notify You If NSA is Spying on You | Social site |
| Facebook wins Flash by knock out by switching to HTML5! | Social site |
| Facebook XSS could have allowed attackers to take over users’ accounts | Security |
| Facebook. Beware state-sponsored hackers are trying to hack you! | Social site |
| Facebook's Vice President Arrested in Brazil for Refusing to Share WhatsApp Data | Social site |
| Factors that influence breach costs | |
| FAKBEN Ransomware-as-a-service emerges from the underground | Virus |
| Fake "account verification" email targeting Alibaba.com users | |
| Fake recruiters on LinkedIn are targeting infosec pros | |
| Fake Twitter verification profiles trick victims into sharing personal, payment card info | |
| Fareit malware avoids detection using a different file hash for each attack | Virus |
| Fatboy Ransomware as a Service sets the ransom based on the victims’ location | |
| FBI Admits — It was a 'Mistake' to Reset Terrorist's iCloud Password | Apple |
| FBI denies paying $1 MILLION to Unmask Tor Users | Security |
| FBI Deputy Director's Email Hacked by Teenager Who Hacked CIA Chief | Hacking |
| FBI Director — "What If Apple Engineers are Kidnapped and Forced to Write (Exploit) Code?" | Apple |
| FBI Director Asks Tech Companies to At least Don't Offer End-to-End Encryption | Security |
| FBI director insists Silicon Valley can solve the encryption dilemma - if they try hard enough | |
| FBI is hunting MrGrey who has stolen 1.2 BILLION login credentials | Hacking |
| FBI must reveal the network investigative technique used to hack more than 1000 computers | Hacking |
| FBI reportedly Paid $1 Million to University Researchers for UnMasking Tor Users | Security |
| FBI Screwed Up — Police Reset Shooter's Apple ID Passcode that leaves iPhone Data Unrecoverable | Apple |
| FBI Suggests Ransomware Victims — 'Just Pay the Ransom Money' | Virus |
| FBI Warns of Increase in DDoS Extortion Scams | |
| FBI Warns Public Officials of Doxing Threat | |
| FBI warns Time Warner Cable of potential data breach | |
| FBI: Social Engineering, Hacks Lead to Millions Lost to Wire Fraud | |
| FBI’s Cyber Task Force Identifies Stealthy FF-RATs used in Cyber Attack | Cyber Attack |
| FCC Says Website Downtime Caused by DDoS Attacks | |
| Feasible ‘Going Dark’ Crypto Solution Nowhere to be Found | |
| February 2016 Patch Tuesday – All Windows are affected by a critical flaw | Vulnerebility |
| Federal CISOs Propose New Efforts to Shore Up Cybersecurity | |
| Federálové Change Policy vyžadovat rozkaz k použití Stingrays | |
| Fewer IPsec VPN Connections at Risk from Weak Diffie-Hellman | |
| File insecurity: the final data leakage frontier | |
| File-stealing Firefox bug exploited in the wild, patch immediately! | |
| FIN5 hacking crew steals 150,000 credit cards from casino | Hacking |
| FIN7 group has enhanced its phishing techniques | |
| Final rule implements the Executive Order 13694. US can apply economic sanctions in response to cyber attacks | Security |
| Final TalkTalk breach tally: 4% of customers affected | |
| Finally! A free, open source, on-premise virus scanner framework | |
| Finance organizations risk data by failing to secure unique employee logins | |
| Finance teams becoming involved in cyber risk mitigation oversight | |
| Financial impact of SaaS storage breaches now $13.85 million | |
| Financial Reporting Council of Nigeria site used for phishing scam | Security |
| FireEye Appliances affected by a critical flaw simply exploitable | Hardware |
| FireEye legally censors crucial parts of a researcher's talk at 44CON | |
| Firefox 40: New features and critical security updates | |
| Firefox 41 integrates Free Built-in Instant Messaging and Video Chat to Your Browser | Technologies |
| Firefox 42 is out, with many privacy and security improvements | |
| Firefox blocks Flash plugin by default until zero-days are fixed | |
| Firefox blocks Flash plugin by default until zero-days are fixed | |
| Firewalls for SMBs that chew through encrypted streams | |
| FIRST announces CVSS version 3 | |
| First Ever Anti-Drone Weapon that Shoots Down UAVs with Radio Waves | Technologies |
| First ever EU rules on cybersecurity | |
| First Let’s Encrypt Free Certificate Goes Live | |
| First Mac OS X Ransomware Targets Apple Users | Apple |
| First step in cross-platform Trojan bankers from Brazil done | Virus |
| Fitbit trackers can be infected with a malware in just 10 seconds | Virus |
| Fitbit, warranty fraud, and hijacked accounts | |
| Five key cybersecurity trends for 2016 | |
| Five major Big Data predictions for 2016 | |
| Five points of failure in recovering from an attack | |
| Five principal cloud security challenges | |
| Five years of hardware and software threat evolution | |
| Flash 0-day exploit found in Hacking Team's leaked data exploited by criminals | |
| Flash Player 0-day exploited in the wild, patch immediately! | |
| Flaw allows hijacking of professional surveillance AirLive cameras | |
| Flaw in Comcast's home security system lets burglars in without triggering alarm | |
| Flaw in Linux.Encoder1 ransomware reveals the decryption key | Virus |
| Flaw in Magento exposes millions of websites at risk of takeover | Vulnerebility |
| Flaw in the Android Gmail app opens to email spoofing attacks | Android |
| Flawed RANSOM_CRYPTEAR ransomware makes impossible the file recovery | Virus |
| Flaws Found in Evoko Meeting Room Management Devices | |
| Flaws in ATMs of a German Bank open the doors to cyber attacks | Computer attack |
| Flaws in industrial gas detectors exploitable by low-skilled attackers | |
| Flaws in medical data management system can be exploited to modify patient information | |
| For Better Privacy & Security, Change these iOS 9 Settings Immediately | Apple |
| Forensics Tool Flaw Allows Hackers to Manipulate Evidence | |
| Former DoE worker was hacking to steal nuclear secrets and resell them | Hacking |
| Former Employee tried to sell Yandex Source Code for Just $29K | Security |
| Former journalist faces 25 years in prison for article defacement | |
| Four critical Android bugs patched, one could lead to permanent device compromise | |
| Four essential tips that you can use to stay safe when you travel | |
| Four Zero Days Disclosed in Internet Explorer Mobile | |
| Fourth, a 16-year-old Hacker, Arrested over TalkTalk Hack | Hacking |
| Fragmented approaches to PKI don't always follow best practices | |
| France could Fine Apple $1 Million for each iPhone it Refuses to Unlock | Apple |
| France wants to BAN Tor and Free Wi-Fi Services after Paris Terror Attacks | Security |
| France will not Ban Public Wi-Fi Or Tor Network, Prime Minister Valls Confirms | Security |
| Fraudsters steal nearly $47 million from Ubiquiti Networks | |
| Free PCI and NIST compliant SSL test | |
| Free Ransomware Decryption Tool — CoinVault and Bitcryptor | Virus |
| Free tool helps organizations respond to vulnerability reports | |
| Free Web Hosting 000Webhost hacked, 13 Million users impacted | Hacking |
| Free WordPress plugin for a password-free login | |
| French activist accuses Anonymous #OpParis of hindering Law Enforcement | ISIS |
| French Authorities Warn Against Spreading Leaked Macron Data | |
| French Gov could fine Apple and Google €1m unless they hack mobile devices | Apple |
| From Linux to Windows – New Family of Cross-Platform Desktop Backdoors Discovered | Vulnerebility |
| From Today Onwards, Don't You Even Dare to Use Microsoft Internet Explorer | Security |
| FTC amends telemarketing rule to ban payment methods used by scammers | |
| FTC, Experts Push Startups to Think About Security From the Beginning | |
| Future attacks: Hiding exploit code in images | |
| Fuze Collaboration Platform Allowed Anyone to Download Recorded Meetings | |
| GameOver Zeus gang boss also engaged in cyber espionage | |
| Gary McGraw on Scalable Software Security and Medical Device Securityf | |
| Gaza cybergang, where’s your IR team? | Security |
| Gemalto Breach Level Index report 2015, what are hackers looking for? | Hacking |
| General Motors invites hackers to report security flaws in their cars | |
| German authorities approve the use of home-made Federal Trojan | Virus |
| German Government Audits TrueCrypt | |
| German Spy-Agency Trades Citizens' Metadata in Exchange for NSA's Xkeyscore | NSA |
| Germany probes alleged new case of US espionage: Regin malware infected Gov laptop | Virus |
| Germany's new cyber-security law aimed at securing critical infrastructure | |
| Getting BYOD right | |
| GCHQ accused of illegal Computer Network Exploitation activities | Security |
| GCHQ and NCA hunting criminals in the dark web | Security |
| GCHQ Gaffer database goes open source | NSA |
| GCHQ helped US in developing Stuxnet, claims a documentary | NSA |
| GCHQ open sources Gaffer, a data collection and mining framework | |
| Gift cards and return merchandise fraud scheme | Hacking |
| Github Mitigates DDoS Attack | |
| GlassRAT, the threat that remained stealth for years | Virus |
| Global action takes down Darkode cybercriminal forum | |
| Global and Modern Terrorism/Cyber Terrorism | Cyber Attack |
| Global cyber insurance market to grow to over $20 billion by 2025 | |
| Global cyberconflicts, hacktivism and disruptions are on the horizon | |
| Global hacker competition challenges penetration testers | |
| Global information security spend grows by 5% in 2015 | Security |
| Global Internet experts reveal plan for more secure, reliable Wi-Fi routers | |
| Global managed security services market to reach $29.9 billion by 2020 | |
| GM Bot (Android Malware) Source Code Leaked Online | Android |
| GnuPG 2.1.9 released | |
| Gone in Less Than a Second | |
| Google 0-Day Hunters Find 'Crazy Bad' Windows RCE Flaw | |
| Google adds another obstacle for developers of deceptive Chrome extensions | |
| Google 'Android N' Will Not Use Oracle's Java APIs | Security |
| Google announces reward program for Android bugs | |
| Google debuts customized warning for social engineering sites | |
| Google Details Plans to Disable SSLv3 and RC4 | Security |
| Google Docs Phishing Scam Doused After Catching Fire | |
| Google Drive security boost for paying customers | Security |
| Google hacker criticized TrendMicro for critical flaws | Hacking |
| Google hacker Forshaw’ verdict about Windows 10 | Windows |
| Google helps Adobe improve Flash security | |
| Google Helps Lead Effort Against Automated Traffic From Data Centers | |
| Google Chrome update includes 43 security fixes | |
| Google is Merging its Chrome OS with Android | Android |
| Google is testing password-free logins | |
| Google Makes Full-Disk Encryption Mandatory for New Android 6.0 Devices | Android |
| Google Moving Gmail to Strict DMARC Implementation | |
| Google Offers $20,000 to Join OSS-Fuzz Program | |
| Google Patches 6 Critical Android Mediaserver Bugs in May Security Update | |
| Google Patches Critical Remotely-exploitable Flaws in Latest Android Update | Android |
| Google Patches Critical Vulnerabilities in Chrome 45 | |
| Google Patches Latest Android Lockscreen Bypass | |
| Google Patches More Critical Flaws in Android Mediaserver | |
| Google patches Stagefright 2.0 on Nexus devices | |
| Google Plans Monthly Security Updates for Nexus Phones | |
| Google Play Apps Expose Tens of Millions to Adware: Sophos | |
| Google Play Store increases Android APK Size Limit from 50MB to 100MB | Android |
| Google plugs Google Admin app sandbox bypass 0-day | |
| Google Project Zero Turns Over 11 Bugs in Galaxy S6 Edge | |
| Google Pushes Stagefright 2.0 Patches to Nexus Devices | |
| Google records and maintains all our voice searches | Security |
| Google releases new hub for managing security and privacy settings | |
| Google releases Security Patch for Android Stagefright 2.0 Vulnerability | Vulnerebility |
| Google Researcher Details Linux Kernel Exploit | |
| Google researcher finds critical flaws in Trend Micro AV solution | |
| Google Researchers Find "Worst" Windows RCE Flaw | |
| Google Safe Browsing to start blocking sites with ads leading to unwanted software | |
| Google Secretly Records Your Voice — Here's How to Listen and Delete It | Security |
| Google Tightens OAuth Rules to Combat Phishing | |
| Google to Disable Weak SSLv3 and RC4 Protocols to Boost Internet Security | Security |
| Google to Pause Flash Ads in Chrome Starting Next Week | |
| Google to Speed Up Chrome for Fast Internet Browsing | Software |
| Google to Warn Recipients of Unencrypted Gmail Messages | |
| Google Wants to Fly Drones Over Your Head to Deliver High Speed 5G Internet | Technologies |
| Google will switch from Java APIs to OpenJDK | Security |
| Google, Mozilla, Microsoft to Sever RC4 Support in Early 2016 | Security |
| Google’s $85 Chromebit Lets You Turn Any Monitor or TV into a Computer | Technologies |
| Google's Android Stagefright patch is flawed | |
| Government Agencies probed over use of backdoored Juniper equipment | Vulnerebility |
| Government Asks for Security Community’s Help on Technical Issues | |
| Government Could Hack Children's Toys to Spy on You | Hacking |
| Government Organizations Targeted in "Netrepser" Attacks | |
| Government Releases Policy on Vulnerability Discovery and Disclosure | |
| GovRAT, the malware-signing-as-a-service platform in the underground | Virus |
| GPS faker software broadcasts spam across thousands of fake profiles | |
| Granick: Dream of Internet Freedom ‘Dying’ | |
| Graph theory applied to a portion of the Dark Web shows it a set of largely isolated dark silos | |
| GreenDispenser, is the last ATM Malware in the wild | Virus |
| Group using DDoS attacks to extort business gets hit by European law enforcement | |
| Growth in Cyber Fraud Attacks Outpacing Growth of Transactions: Report | |
| Guide to application whitelisting | |
| Guidelines for smart city technology adoption | |
| Hack the Pentagon — US Government Challenges Hackers to Break its Security | Hacking |
| Hacker Buba is asking UAE bank for $3 million ransom | Virus |
| Hacker Claims He helped FBI Track Down ISIS Hacker (Who was killed in Drone-Strike) | ISIS |
| Hacker claims Sony PlayStation 4 Jailbreak | Hacking |
| Hacker Confirms PlayStation 4 Jailbreak! Exploit Could Open Doors for Pirated Games | Hacking |
| Hacker Demonstrated Untethered iOS 9 Jailbreak On Video | Apple |
11.9.2015 | Hacker Demonstrated Untethered iOS 9 Jailbreak On Video | Apple |
| Hacker Finds a Simple Way to Bypass Android 5.x Lock Screen [Steps & Video] | Android |
| Hacker had access to sensitive info about Firefox bugs for over a year | |
| Hacker holds Netflix to ransom over new episodes of Orange Is The New Black | |
| Hacker Leaks Info of 30,000 FBI and DHS Employees | Hacking |
| Hacker leaks sensitive info of millions of Adult FriendFinder users | |
| Hacker steals Bitdefender customer info, blackmails company | |
| Hacker-Friendly Search Engine that Lists Every Internet-Connected Device | Hacking |
| Hackers are blackmailing the creator of Open-Source Ransomware | Virus |
| Hackers are exploiting Magento flaw to steal payment card info | |
| Hackers are exploiting zero-day flaw in fully patched Adobe Flash | |
| Hackers Are Offering Apple Employees $23,000 for Corporate Login Details | Hacking |
| Hackers are selling fake diplomas and certifications in the dark web | |
| Hackers are spending a huge amount of resources targeting financial services | |
| Hackers are stealing money from Bank accounts in Germany by exploiting flaws in #SS7 protocol | |
| Hackers are using Nuclear Exploit Kit to Spread Cryptowall 4.0 Ransomware | Virus |
| Hackers Backdooring Cisco WebVPN To Steal Customers’ Passwords | Hacking |
| Hackers behind Dark Seoul are back | Hacking |
| Hackers behind Dyre Malware Busted in Police Raid | Virus |
| Hackers breach firm whose tech is used in Samsung Pay | |
| Hackers Can Remotely Record and Listen Calls from Your Samsung Galaxy Phones | Hacking |
| Hackers can tamper with medical drug pumps, leading to fatal outcomes | |
| Hackers cause power outage with malware in Ukraine. Is it an Information warfare act? | Virus |
| Hackers Cause World's First Power Outage with Malware | Virus |
| Hackers claim ISIS Militants linked to Paris Attacks had a Bitcoin Wallet worth $3 Million | ISIS |
| Hackers Exploit Free SSL Certs from Let's Encrypt to Spread Malware | Virus |
| Hackers Exploit SS7 Flaws to Loot Bank Accounts | |
| Hackers Find A Way To Disable Car Airbags System | Hacking |
| Hackers have accessed details of 1,827 Vodafone customers | Hacking |
| Hackers have Hacked into US Arrest Records Database | Hacking |
| Hackers hit UCLA Health, access medical files of 4.5 million patients | |
| Hackers in the wild attempt to exploit the Juniper Backdoor | Hacking |
| Hackers leaked DHS staff records, 200GB of files are in their hands | Hacking |
| Hackers Plan to Ruin Christmas Eve for Millions of PlayStation and Xbox Live Gamers | Hacking |
| Hackers put up for sale 13 million plaintext passwords stolen from 000webhost | |
| Hackers show how reuse barcodes to be able to get fuel discounts | Hacking |
| Hackers stole personal info of over a million of Japanese pensioners | |
| Hackers Threaten Media Firms After Stealing Unreleased TV Shows | |
| Hackers trace ISIS Twitter accounts back to the UK govt | ISIS |
| Hackers WIN $1 Million Bounty for Remotely Hacking latest iOS 9 iPhone | Hacking |
| Hack-Fueled ‘Unprecedented’ Insider Trading Ring Nets $100M | Hacking |
| Hacking CCTV Cameras to Launch DDoS Attacks | Computer attack |
| Hacking discipline, EOL of computer science in the cyber domain | Hacking |
| Hacking enterprise wireless Printers with a drone or a vacuum cleaner | Hacking |
| Hacking Smartphones Running on MediaTek Processors | Mobil |
| Hacking Team hacked, 400GB+ of company documents and emails leaked | |
| Hacking Team Offering Encryption Cracking Tools to Law Enforcement Agencies | Hacking |
| Hacking Team pitches encryption-cracking tools to US law enforcement | |
| Hacking Team scrambling to limit damage brought on by explosive data leak | |
| Hacking Team's Flash 0-day exploit used against Korean targets before it was leaked | |
| Hacktivists and cyber extortionists hit Greek, Russian, UAE banks | |
| Half of iPhones on corporate networks run outdated iOS versions | |
| Hard-hitting insights into global attacks targeting organizations | |
| Hardware encryption market revenue to reach $36.4 billion by end of 2015 | |
| Hashcat, the fastest Password Cracking utility is now Open Source | Security |
| Health Insurer Excellus Hacked; 10.5 Million Records Breached | Hacking |
| Health Insurer Excellus Hacked; 10.5 Million Records Breached | |
| Health records of 5.5 million US patients accessed in MIE breach | |
| Healthcare industry sees 340% more security incidents than the average industry | |
1.9.2015 | Here's How Iranian Hackers Can Hack Your Gmail Accounts | |
| Here's How SIEM Can Protect Your Privileged Accounts in the Enterprise | Security |
| Here's How to Decrypt Hydracrypt & Umbrecrypt Ransomware Files | Virus |
| Here's How to Stop Windows 7 or 8 from Downloading Windows 10 Automatically | Windows |
| Here's How Websites Are Tracking You Online | Security |
| Here's the Facebook Hacking Tool that Can Really Hack Accounts, But... | Social site |
31.8.2015 | Here's Top Features Expected in Next iPhone Release | |
| Here's Why Microsoft Drops a Cloud Data Center Under the Ocean | Technologies |
| Hey ISIS! Check Out How 'Idiot' Anonymous Hackers Can Disrupt your Online Propaganda | ISIS |
| Hey, Apple User! Check If You are also Affected by the Sparkle Vulnerability | Apple |
| Hidden Data Economy Report Exposes Price Points for Stolen Data | Crime |
| Hidden tear and its spin offs | Virus |
| High prevalence of personal health information at risk | |
| High severity Internet Explorer 11 vulnerability identified after Hacking Team breach | |
| High school Student Hacked Into CIA Director's Personal Email Account | Hacking |
| High-impact DoS flaw patched in Node.js, update as soon as possible | |
| High-Profile Targets Attacked via Software Update Mechanism | |
| High-Risk SAP HANA Vulnerabilities Patched | |
| Hilton confirms some payment systems infected by malware | Virus |
| Holes Patched in Online Bookmarking App Pocket | |
| Hollywood Hospital Pays $17,000 Ransom to Hacker for Unlocking Medical Records | Virus |
| Hope is not a strategy, we need more healthy paranoia | |
| Hospitals advised to stop using vulnerable computerized drug pumps | |
| Hotel Chain Hilton Worldwide Investigating Potential POS Breach | |
| How A Drone Can Infiltrate Your Network by Hovering Outside the Building | Security |
| How Amazon Employee bought 'Google.com' Domain for Only $12 from Google | Technologies |
| How are businesses responding to cyber risks? | |
| How attackers attempt to infect organizations | |
| How BitTorrent activity impacts security ratings | |
| How boards calibrate strategy and risk | |
| How businesses interpret and use threat intelligence | |
| How can we decide on surveillance and privacy when we can't see the whole picture? | |
| How CoinVault or Bitcryptor victims could try to recover their files | Virus |
| How companies can regain consumer trust after a data breach | |
| How complex attacks drive the IT security innovation race | |
| How do you ensure success with DevOps? | |
| How does the ISIS control the Internet? | ISIS |
| How engaged is the average board when it comes to security? | |
| How experts stay safe online and what non-experts can learn from them | |
| How fake users are impacting business through acts of fraud and theft | |
| How gamers can help improve critical software security | |
| How Hackers Can Hack Your Chip-and-PIN Credit Cards | Hacking |
| How Just Opening an MS Word Doc Can Hijack Every File On Your System | Hacking |
| How lack of trust and limited knowledge impact your organization | |
| How many employees present a cloud security risk? | |
17.10.2015 | How NSA successfully Broke Trillions of Encrypted Connections | BigBrothers |
| How online fraud will evolve in 2016 | |
| How organizations can increase trust and resilience | |
| How Some Chinese Hackers Started Making Big Money | Hacking |
| How Spy Agencies Hacked into Israeli Military Drones to Collect Live Video Feeds | NSA |
| How The Russian Abused Twitter as C&C in Hammertoss Malware? Python Answers | Virus |
| How the threat landscape will change by 2020 | |
| How to Activate GodMode in Windows 10 | Windows |
| How to Auto-BackUp Your WhatsApp Data to Google Drive with Encryption | Security |
| How to avoid data breaches? Start by addressing human error | |
| How to become a nightmare for cyber attackers | |
| How to become an Information Security Expert with the CISSP Certification | Security |
| How to Build a Successful Incident Response Plan | Security |
| How to convert 30$ D-Link DCS web cameras into a backdoor | Vulnerebility |
| How to Crack GCHQ Crypto Puzzle? — Here's the Solution | NSA |
| How to Crash Your Friends' WhatsApp Just By Sending Crazy Smileys | Security |
| How to Detect IE Zero-day Exploit Used to Deploy Korplug Malware | Exploit |
| How to extract PIN from any selfie, is biometrics secure? | Security |
| How to find a free, secure proxy service? | |
| How to Fix Chrome Massive Memory Usage? Simply Try 'Chrome 45' for Faster Performance | Software |
| How to Hack a Computer from 100 Meters by Hijacking its Wireless Mouse or Keyboard | Hacking |
| How to hack airbag in Audi TT on other models | Hacking |
| How to Hack and Decrypt WhatsApp Database on rooted devices | Hacking |
| How to Hack WiFi Password from Smart Doorbells | Hacking |
| How to hide from surveillance cameras: the past and the future | Technologies |
| How to improve Internet security after the disclosure of the Diffie-Hellman flaw | Vulnerebility |
| How to Install Android 6.0 Marshmallow and When will Your Smartphone Get it? | Android |
| How To Keep Your Android Phone Secure | Android |
| How to protect your privacy on Windows 10 | |
| How to Protect Yourself against XcodeGhost like iOS Malware Attacks | Apple |
| How to Root Windows Phone and Unlock the Bootloader to Install Custom ROMs | Hacking |
| How to Run Multiple Android apps on Windows and Mac OS X Simultaneously | Apple |
| How to silently control a mobile phone from 16 Feet Away | Security |
| How to steal Jaguar XFR cars in 60 seconds by hacking them | Security |
| How to Steal Secret Encryption Keys from Android and iOS SmartPhones | Apple |
| How to survive a compliance audit | |
| How to thwart the passcode lock screen on iOS 8 and 9? | Apple |
| How to Turn Any Non-Touch Screen PC Into a Touch Screen | Security |
| How to turn on two-factor authentication on over 100 popular online services | |
| How to turn on two-factor authentication on over 100 popular online services | |
| How to use GCAT backdoor with Gmail as a C&C server | Virus |
| How To Use WhatsApp Web Client on iPhone and Other iOS Devices | Apple |
| How trustworthy are the world's leading websites? | |
| How UK businesses plan to tackle security threats in 2016 | |
| How you can anonymously use public Wi-Fi from miles afar | |
| How-to — Stealing Decryption Key from Air-Gapped Computer in Another Room | Security |
| HP Laptop Audio Driver Acts as Keylogger | |
| HP releases exploit code for IE zero-day that Microsoft won't patch | |
| HSBC online banking services offline due to a DDoS attack | Cyber Attack |
| HTC phone stores fingerprints in easily accessible plaintext | |
| HTML5 Security Cheat Sheet | |
| HTTP error code 451 will signal online censorship | |
| HTTPS Available as Opt-In for Blogspot | |
| HTTPS Bicycle attack reveals password length, allows easier brute-forcing | |
| Huawei 3G routers rife with flaws | |
| Huge Flash Update Patches More Than 30 Vulnerabilities | |
| Human behaviour still the biggest threat to company security | |
| Human error reduces security offered by encryption apps | |
| Hundreds of Apps Using Ultrasonic Signals to Silently Track Smartphone Users | |
| Hundreds of thousands of engine immobilizers remotely hackable | Hacking |
| Hyatt Hotel Says Payment Systems Hacked with Credit-Card Stealing Malware | Virus |
| Hyatt hotels data breach, 250 hotels impacted in 50 countries | Crime |
| Chakra JavaScript Engine: Microsoft Open-Sources the Heart of Edge browser | Vulnerebility |
| Charlie Miller to Leave Twitter Security Team | |
| Check out data-centric security solutions at Infosecurity Europe | |
| Check out the Windows 10 security features | |
| Cherry Picker, a PoS Malware even more threatening | Virus |
| Chikdos cross-platform DDoS botnet hit SQL servers worldwide | Security |
| Chimera, a new strain of ransomware in the wild | Virus |
| China — OPM Hack was not State-Sponsored; Blames Chinese Criminal Gangs | Hacking |
| China APT Gang Targets Hong Kong Media via Dropbox | |
| China arrested hackers responding to a US Government request | Hacking |
| China arrested hackers suspected of OPM hack | Hacking |
| China blamed for cyber attack on Bureau of Meteorology computer | Cyber Attack |
| China is the top target for DDoS reflection attacks | |
| China Passes Anti-Terrorism Law; Here's What You Need to Know | Security |
| China passes its first Anti-Terrorism law | Security |
| China spies on airline passengers with IMSI-catchers | Security |
| China-Linked Spies Use Recent Zero-Day to Target Financial Firms | |
| Chinese fraudsters are hijacking and misusing Uber accounts | |
| Chinese hackers arrested at US request | |
| Chinese Hackers Breached LoopPay for cyber espionage through Samsung Pay | Hacking |
| Chinese hackers target Taiwanese Opposition Party and media | Cyber Attack |
| Chinese Hackers tried to Take Down Tibetan Social Networking Website | Hacking |
| Chinese ISPs are redirecting users legitimate traffic to malicious sites/ads | Virus |
| Chinese ISPs Caught Injecting Ads and Malware into Web Pages | Virus |
| Chinese Mobile Ad Library Backdoored to Spy on iOS Devices | |
| Chinese TA459 APT exploits CVE-2017-0199 flaw to target Financial firms | |
| Chip-and-PIN Credit Cards and The Deadline: Here's What You need To Know | Security |
| Chrome exploit leaves million Android devices open to attack | Android |
| Chrome extension thwarts user profiling based on typing behavior | |
| Chrome extensions easily disabled without user interaction | |
| Chrome Zero-day Exploit leaves MILLIONS of Android devices vulnerable to Remote Hacking | Vulnerebility |
| I am HDRoot! Part 1 | Security |
| IBM cloud tool enables privacy-preserving user authentication | |
| IBM Supply Chain Breached as Storwize USBs Ship With Malware | |
| iCloud Keychain vulnerability allowed hackers to Steal sensitive data | |
| Identify and track sensitive corporate data in real-time | |
| Imperfect algorithms threaten democracy | |
| In Wake of Cyberattacks, U.S. Readies Sanctions Against China | Cyber Attack |
| Incredible! Someone Just Hacked 10,000 Routers to Make them More Secure | Hacking |
| India temporarily Bans Facebook's Free Internet Service | News |
| Indicators of compromise as a way to reduce risk | Security |
| Industrial Robots Vulnerable to Remote Hacker Attacks | |
| Industrial security awareness continues to remain low | |
| Info of 2.4 million Carphone Warehouse customers stolen | |
| Infographic: Devaluing data, fighting cybercrime | |
| Information security and privacy are crucial for EU growth | |
| Information security governance practices are maturing | |
| Information Security Practices of Aadhaar – 135 Million Indian government payment card details leaked | |
| Information security: A key issue in the 2016 U.S. presidential campaign? | |
| Infosec pros are moving beyond traditional passwords | |
| Infosec pros have little confidence in UK's cybersecurity readiness | |
| Infosecurity Europe 2015, expo floor | |
| Innovative security research comes to Singapore | |
| Insecure Apps that Open Ports Leave Millions of Smartphones at Risk of Hacking | |
| Inside the German cybercriminal underground | Hacking |
| Inside the largely unexplored world of mainframe security | |
| Inside the Unpatched OS X Vulnerabilities | |
| Insider threat: A crack in the organization wall | |
| Insider trading ring hacked into newswire services, raked in $100M based on stolen info | |
| Instagram Adds Two-Step Verification to Prevent Account from being Hacked | Social site |
| Installation of Tor Relay in Library Attracts DHS Attention | |
| Instapaper for Android vulnerable to man-in-the-middle attacks | |
| Intel establishes automotive security review board | |
| Intel Warns of Critical Vulnerability in Processor Firmware | |
| Intelligent packet capture for increased network visibility | |
| InterApp, the device that can hack any Smartphone | Mobil |
| Internet Root Name Servers Survive Unusual DDoS Attack | |
| Internet root servers flooded with 5 million queries a second | Computer attack |
| iOS 9 boosts iPhone 6s and iPad Pro security with improved 2FA | Apple |
| iOS 9 Hack: How to Access Private Photos and Contacts Without a Passcode | Apple |
| iOS 9 partially fixes critical, easily exploitable AirDrop bug | |
| iOS 9 partially fixes critical, easily exploitable AirDrop bug | |
| iOS 9 security flaw lets attackers access device through Siri | Apple |
| iOS AirDrop vulnerability allows for malware installation on Apple devices | Apple |
| iOS Masque Attack Weaponized: A Real World Look | Apple |
| iOS Mobile Banking Apps, what is changed from 2013 tests? | Apple |
| iOS Sandbox Vulnerability Puts Enterprise Data at Risk | Apple |
| IoT attacks and evasion techniques will characterize threats in 2016 | |
| IoT developers concerned about privacy and data protection | |
| IoT devices are re-using cryptographic keys, leaving in danger millions of devices | Hacking |
| IoT devices: The good, the bad and the ugly | |
| IP camera manufacturers force researcher to pull conference talk | |
| Ipswitch offers secure managed file transfer analytics and reporting | |
| Iranian Cleaver hackers exploit LinkedIn for cyber espionage | Security |
| Iranian Government says Daesh doesn’t pose a threat to Iran | Security |
| Iranian hackers compromised former IDF chief’s computer | Hacking |
| Iranian Hackers Exploit Recent Office 0-Day in Attacks: Report | |
| Iranian Hackers focus their efforts in Android RATs | Android |
| Iranian hackers penetrated computers of a small dam in NY | Hacking |
| IRS Hack May Implicate Three Times As Many Taxpayers Than Expected | |
| IRS is warning taxpayers of a new surge in tax-related incidents | Security |
| IS hackers are attacking the US energy grid | |
| Is he Satoshi Nakamoto? Australian Police raid home of the alleged Bitcoin father | Technologies |
| Is Play Station Network under attack? Users reported issues | Cyber Attack |
| Is the Cybersecurity Act of 2015 effective? | |
| Is the North Korea behind the attack on the Seoul Subway Operator? | Computer attack |
| Is This Security-Focused Linux Kernel Really UnHackable? | Security |
| Is this the death knell for the RC4 encryption algorithm? | |
| Is Vuvuzela the most secure SMS text messaging system? | Android |
| Is your board ready for a security incident? | |
| ISC's infocon turns yellow to reflect critical impact of Juniper backdoors | |
| iSight Partners says the Sandworm APT is involved Ukrainian power outage | Virus |
| ISIS – The first man charged of cyber terrorism has been extradited to the US | ISIS |
| ISIS Calls Anonymous "IDIOTS" and Issues 5 Lame Tips for its Members to Avoid Getting Hacked | ISIS |
| ISIS Hacker who Passed U.S. Military Data to Terrorists Arrested in Malaysia | ISIS |
| ISIS members have developed a mobile app for its communications | ISIS |
| ISIS offers hackers up to $10,000 to hack govt websites | ISIS |
| ISIS operation security guide gives insight into group's cybersecurity practices | |
| ISIS recruited experts set to wage chemical and biological attacks | ISIS |
| ISIS Supporter Hacks 54,000 Twitter Accounts and Posts Details of Heads of the CIA and FBI | ISIS |
| Islamic State launches the Kybernetiq magazine for cyber jihadists | ISIS |
| Isle of Man taxpayers' info leaked due to email error | |
| Israeli Electrical Power Grid Suffers Massive Cyber Attack | Cyber Attack |
| Israeli Public Utility Authority hit by a severe cyber attack | Cyber Attack |
| IT admits obstacles to user mobility due to security concerns | |
| IT priorities are changing: Cloud-first strategy to rise | |
| IT Security in SMEs: Guidelines published by UNICRI | Security |
| IT teams expect a nightmare during the holidays | |
| IT threat evolution in Q2 2015 | REPORTS |
| IT threat evolution in Q3 2015 | Security |
| IT use of cloud surges to record heights | |
| It Works! Google's Quantum Computer is '100 Million Times Faster' than a PC | Security |
| It’s official! People want a more trustworthy Internet | |
| Italian intelligence plans to monitor also communications through the Playstation | Security |
| It's not just about Big Data, it's what you do with it | |
| It's Now Legal to Jailbreak Smart TV, Smartphone Or Tablet | Apple |
| It's official: The average DDoS attack size is increasing | |
| It's undeniable, IoT will change security forever | |
| Ivan Ristic and SSL Labs: How one man changed the way we understand SSL | |
| Jail Authorities Mistakenly Early Released 3,200 Prisoners due to a Silly Software Bug | Security |
| January Android security update fixes 5 critical flaws, removes unneeded component | |
| Japanese Banking Trojan Shifu Combines Malware Tools | Virus |
| JavaScript DDoS Attack Peaks at 275,000 Requests-Per-Second | Computer attack |
| Jenkins patched a critical RCE flaw in its open source automation server | |
| Jessy Irwin on Password Security, Opsec and User Education | |
| JetAudio and JetVideo media player vulnerability allows arbitrary code execution | |
| Joomla 3.4.5 patches Critical SQL Injection Vulnerability | Vulnerebility |
| Joomla SQL Injection Vulnerability exploited in the wild | Vulnerebility |
| Joomla under attack due to a zero-day. Patch your CMS now! | Computer attack |
| Joomla Update Patches Critical SQL Injection Vulnerability | |
| JPMorgan Hack — Three Men Charged in Biggest Bank Hack in History | Hacking |
| JPMorgan hackers also hacked an anti-fraud corporation | Hacking |
| JSPatch hot patching technique puts iOS users at risk | Apple |
| Judge Confirms Government Paid CMU Scientists to Hack Tor Users for FBI | Security |
| Juniper Backdoor Picture Getting Clearer | |
| Juniper Firewalls with ScreenOS Backdoored Since 2012 | Hardware |
| Juniper to kill off Dual_EC RNG in ScreenOS following new backdoor revelations | |
| Juniper will drop a function alleged developed by the NSA for surveillance | NSA |
| Just $1400 to build an IMSI catcher like device to track phones | Security |
| Just Like Old Days: IOT Security Pits Regulators Against Market | |
| Just Like Windows 10, Windows 7 and 8 Also Spy on You – Here’s How to Stop Them | Privacy |
| Just One Device? No, Government wants Apple to Unlock 12 More iPhones | Apple |
| Kanye West, Who wants to destroy ‘The Pirate Bay’, Caught using Torrent Site | Security |
| Karma Police, how GCHQ tried to track every visible user on Internet | NSA |
| Kaspersky DDoS Intelligence Report for Q4 2015 | Computer attack |
| Kaspersky DDoS Intelligence Report Q3 2015 | Security |
| Kaspersky Lab APT Trends report, Q1 2017 – From Lazarus APT to StoneDrill | |
| Kaspersky Security Bulletin 2015. Top security stories | Cyber Attack |
| Kaspersky Security Bulletin. 2016 Predictions | Security |
| Kaspersky Security Bulletin. Spam and phishing in 2015 | Security |
| Kazakhstan makes it Mandatory for its Citizens to Install Internet Backdoor | Virus |
| KeeFarce Hacking tool steals encrypted credentials from KeePass password manager | Hacking |
| Keep your site more secure with WordPress 4.3 | |
| Kemoge – Malicious Android Adware Infects Devices worldwide | Virus |
| Kemoge Android Adware Campaign Can Lead to Device Takeover | |
| Kemoge: Latest Android Malware that Can Root Your Smartphone | Android |
| KeRanger, the new MAC OS X ransomware that hit Apple users on the weekend | Apple |
| Key developments on the cyber threat landscape in 2016 | |
| Keyboard app bug puts millions of Samsung mobile users at risk, researcher claims | |
31.8.2015 | Keyraider-malware-steals-certificates-keys-and-account-data-from-jailbroken-iphones | |
| KILLER! Unpatched WinRAR Vulnerability Puts 500 Million Users At Risk | Vulnerebility |
| Kim Dotcom loses Fight Against Extradition to the US | News |
| Kim Dotcom's Decentralized Internet — For You, Powered By You | Technologies |
| Kingston releases encrypted USB with keypad access | |
| Lack of skills and recruiting among challenges facing information security profession | |
| Lack of visibility and security concerns hinder cloud adoption | |
| Large Companies Lack Clear Vision on Industrial IoT | |
| Lasers can ‘immobilize driverless cars’ | Hardware |
| LastPass 4.0 features fresh UX, emergency access, sharing center | |
| LastPass breached, hashed master passwords compromised | |
| LATENTBOT, one the highly obfuscated backdoor in the wild | Virus |
| Latest APT 28 Campaign Incorporates Fake EFF Spearphishing Scam | APT |
| Latest EMET Bypass Targets WoW64 Windows Subsystem | |
| Latest iOS 9.0.1 Update Failed to Patch Lockscreen Bypass Hack | Apple |
| Latest Windows 10 May Have a Linux Subsystem Hidden Inside | OS |
| Law enforcement arrested operators behind the MegalodonHTTP Botnet | Security |
| Law Enforcement raided DDoS extortion group DD4BC | Computer attack |
| Leaked Hacking Team emails show Saudi Arabia wanted to buy the company | |
| Lenovo Caught (3rd Time) Pre-Installing Spyware on its Laptops | Virus |
| Lenovo Patches Vulnerabilities in System Update Service | |
| Lenovo SHAREit affected by hard-coded password and many other flaws | Vulnerebility |
| Lenovo warns of IBM Storwize shipped with infected initialization USB drives | |
| Let’s Encrypt Hits Another Free HTTPS Milestone | |
| Let’s Encrypt Initiative Enters Public Beta | |
| Let's Encrypt CA releases transparency report before its first certificate | |
| Let's Encrypt CA to issue its first cert | |
| Let's Encrypt Free SSL/TLS Certificate Now Trusted by Major Web Browsers | Security |
| Let's Encrypt Project issues its First Free SSL/TLS Certificate | Kryptografie |
16.9.2015 | Let's Encrypt Project issues its First Free SSL/TLS Certificate | Kryptografie |
| Li-Fi is 100 times Faster than Wi-Fi Technology: Real-World Tests Prove | Technologies |
| Like it or not, Microsoft Plans to Push Windows 10 Upgrade more Aggressively | Windows |
| Linksys wireless routers are open to cyber attacks | Cyber Attack |
| Linode forces password reset for all users due to suspected breach | |
| Linux container security and certification concerns remain | |
| Linux Foundation Launches 'Zephyr', a tiny OS for Internet of Things | OS |
| Linux Fysbis Trojan, a new weapon in the Pawn Storm’s arsenal | Virus |
| Linux machines can be "owned" by hitting backspace 28 times | |
| Linux Mint was hacked, website served malicious ISO on Saturday | Hacking |
| Linux ransomware already infected at least tens of users | Virus |
| Linux x86_64 Bindshell with Password (92 bytes) | |
| Linux XOR DDoS Botnet delivers potent DDoS attacks | Computer attack |
| List of approved Windows 10 compatible security products | |
| LockerPin Ransomware Resets PIN and Permanently Locks Your SmartPhones | Virus |
| Locky Ransomware uses AES to encrypt Local Files and Unmapped Network Shares | Virus |
| LogMeIn to acquire LastPass for $125 million | |
| Long-term skills shortage drives tech salaries up | |
| Looks like mobile device security is on nobody's mind | |
| LowLevel04 ransomware exploits Remote Desktop to spread | Virus |
| Mabouia: The first ransomware in the world targeting MAC OS X | Apple |
| Mac OS X is the software with most vulnerabilities in 2015 | Apple |
| Macron Blasts Huge Hacking Attack Just Before French Vote | |
| 'Macronleaks': Hackers Find Flaw in French Cyber-Fortress | |
| MagSpoof: A device that spoofs credit cards, disables chip-and-PIN protection | |
| Major browser makers synchronize end of support for RC4 | |
| Major Xen update fixes over 20 vulns, including guest/host escape flaw | |
| Malicious advertisements surge! 260% spike in 2015 | Virus |
| Malicious spam campaign capitalizes the global interest in the Zika virus | Security |
| Malvertisers abused Yahoo’s ad network for days | Virus |
| Malvertising attack hit The Economist, anti-ad blocking service PageFair hacked | Virus |
| Malvertising campaign targeted the Forbes Website, million users at risks | Virus |
| Malware Hunter, the project developed by Shodan and Recorded Future to find C&C Servers | |
| Malware on the Smart TV? | Virus |
| Malware threats on pirated content sites | |
| Malware-based attack targets America’s Thrift Stores | Virus |
| Malwarebytes hardly working to fix flaws in its antivirus | Virus |
| Malwaresearch – A command line tool to find malware on Openmalware.org | |
| Man gets 50 months in prison hacking U.S.-based financial institutions | |
| Man charged of Laundering $19.6 Million earned with PBX system hacking | Hacking |
| Man stole special agent's identity, executed a complex identity theft scheme | |
| Manipulating WSUS to Own Enterprises | |
| Many popular Android apps fail to encrypt login credentials | |
| Map a path through the issues of cloud, security, data analytics | |
| Mapping the underground cybercrime economy in order to disrupt it | |
| Mark Zuckerberg Plans to Build Iron Man's JARVIS like Artificially Intelligent Assistant | Technologies |
| Mark's Milestone: 1 Billion People Uses Facebook in A Single Day | Social site |
| Maru OS — Android ROM that Turns into Debian Linux When Connected to a PC | Android |
| Mass adoption of mobile payment services derailed by security, privacy concerns | |
| Massive campaign uses router exploit kit to change routers' DNS servers | |
| Mastercard is trying out purchase verification with selfies | |
| Mazar Bot actively targeting Android devices and wiping them | Android |
| McAfee study on the prices of stolen data on the Dark Web | Crime |
| Meet Linux's New Fastest File-System – Bcachefs | OS |
| Meet The World's First Person Who Hacked His Body to Implant a Bitcoin Payment CHIP | Hacking |
| Meet World's Fastest Wi-Fi Router (Looks Like an Alien) | Hardware |
| Microsoft 'Accidentally' pushed 'Test patch' Update to All Windows 7 Users | Windows |
| Microsoft bans Superfish-like adware methods starting in March 2016 | Virus |
| Microsoft Collecting More Data of Windows 10 Users than Initially Thought | Security |
| Microsoft Considers Earlier SHA-1 Deprecation Deadline | |
| Microsoft Cracks Down on Toolbars, Unsigned DLLs with Edge Update | |
| Microsoft details how Device Guard fights malware in Windows 10 | |
| Microsoft doesn’t want Windows 10 Users to Switch to Chrome or Firefox | Windows |
| Microsoft Edge: New browser, new risks for Windows 10 | |
| Microsoft Edge's InPrivate Mode Finally Keeps Your Activity Private | Security |
| Microsoft expands Bug Bounty programs, increases rewards | |
| Microsoft Fixes Antimalware Engine Flaw Found by Google Experts | |
| Microsoft fixes critical flaws in all versions of Windows and Office | |
| Microsoft fixes critical vulnerabilities affecting Windows and Office | Vulnerebility |
| Microsoft fixes Microsoft Malware Protection Engine RCE vulnerability CVE-2017-0290 found by Google | |
| Microsoft flags Ask toolbar as unwanted and dangerous | |
| Microsoft has Built its own Linux Operating System | Technologies |
| Microsoft Chooses Ubuntu Linux for their Cloud-based Azure HDInsight Big Data Solution | Technologies |
| Microsoft is Auto-Downloading Windows 10 to PCs, Even If You Don't Want it | Windows |
11.9.2015 | Microsoft is Auto-Downloading Windows 10 to PCs, Even If You Don't Want it | Windows |
| Microsoft Issues Emergency Patch For Critical RCE in Windows Malware Scanner | |
| Microsoft issues emergency patch for IE flaw exploited in the wild | |
| Microsoft Issues Patches for Another Four Zero-Day Vulnerabilities | |
| Microsoft Keeps Backup of Your Encryption Key on it's Server — Here's How to Delete it | Security |
| Microsoft kills many critical flaws, some 0-days, un-trusts one wildcard cert | |
| Microsoft Kills SHA-1 Support in Edge, Internet Explorer 11 | |
| Microsoft maintains the recovery key of your new PC | Security |
| Microsoft Opens .NET Core, ASP.NET Bug Bounties | |
| Microsoft Outlook flaw opens the door to “mailbomb” attacks | Computer attack |
| Microsoft Patch Tuesday updates for May 2017 fix Zero Days exploited by Russian APT groups | |
| Microsoft Patches Critical Vulnerabilities in New Edge Browser | |
| Microsoft Patches Edge Flaws Disclosed at Pwn2Own | |
| Microsoft Patches Graphics Component Flaw Under Attack | |
| Microsoft Patches Zero-Days Exploited by Russia-Linked Hackers | |
| Microsoft Pays $24,000 Bounty to Hacker for Finding 'Account Hacking' Technique | Hacking |
| Microsoft plugs another Windows zero-day with emergency patch | |
| Microsoft pushes out security updates, plugs holes actively exploited by attackers | |
| Microsoft Releases 12 Security Updates (5 Critical and 7 Important Patches) | Vulnerebility |
9.9.2015 | Microsoft Releases 12 Security Updates (5 Critical and 7 Important Patches) | Vulnerebility |
| Microsoft Responds To Windows 10 Spying Concerns, But It will Still Collect Your Data | Privacy |
| Microsoft Revokes Trust for Certificates Leaked by D-Link | |
| Microsoft Security Bulletin MS15-093 - Critical OOB - Internet Explorer RCE | Vulnerebility |
| Microsoft Security Updates January 2016 | Vulnerebility |
| Microsoft Security Updates November 2015 | Security |
| Microsoft Security Updates October 2015 | Vulnerebility |
| Microsoft Starts automatically Pushing Windows 10 to all Windows 7 and 8.1 Users | OS |
| Microsoft WARNING — 'Use Windows 7 at Your Own Risk' | Security |
| Microsoft warns of imminent end of support for all but the latest Internet Explorer versions | |
| Microsoft will add SSH support to PowerShell | |
| Microsoft will Inform You If Government is Spying on You | Security |
| Microsoft will stop trusting certificates from 20 Certificate Authorities | |
| Microsoft Windows 10 is now Installed on over 200 Million Devices | OS |
| Microsoft, Law Enforcement Collaborate in Dorkbot Takedown | |
| Microsoft's new security posture leads to baked-in security | |
| Mikko Hyppönen warns the ISIS has a credible offensive cyber capability | ISIS |
| Million CISCO ASA Firewalls potentially vulnerable to attacks | Vulnerebility |
| Millions affected by Scottrade brokerage breach that dates back two years | |
| Millions of IoT Devices Using Same Hard-Coded CRYPTO Keys | Security |
| Millions of smart devices at risk from 3-year-old flaw | Android |
| Millions of smartphones, IoT devices risk compromise due to 3-year-old bug | |
| Misconfigured MongoDB allowed manipulation of a Microsoft’s career portal | Vulnerebility |
| Mission '1 Billion' — Microsoft will Automatically Offer Windows 10 Upgrade | Windows |
| Mission: Hacking Grandma. Level: piece of cake | Hacking |
| MIT Develops Hack-Proof RFID Chip — Here's How It Works | Hacking |
| MIT Scientists: Now You Can See Through Walls with Wi-Fi | Technologies |
| Mobile ad network exploited to launch JavaScript-based DDoS attack | |
| Mobile Ad Network exploited to run a major DDoS Attack | Android |
| Mobile malware evolution 2015 | Mobil |
| Mobile payments data breaches expected to grow | |
| Mobile users continue to put personal and corporate data at risk | |
| Model Assesses Readiness to Accept Outside Vulnerability Reports | |
| Modern railroad systems vulnerable to cyber attacks | Cyber Attack |
| ModPos, the most complex POS malware ever seen | Virus |
| Moonpig Warns Customers of ‘Security Issue’ | |
| More than 100 Million Android users at risk due to the Baidu Moplus SDK | Android |
| More than 250 iOS Apps Caught Using Private APIs to Collect Users' Private Data | Apple |
| More than 900 embedded devices share hard-coded certs, SSH host keys | |
| More than a third of employees would sell company data | |
| Most are concerned about security of healthcare data | |
| Most are unaware of the seriousness of medical data theft | |
| Most companies don't believe their information security meets their organization's needs | |
| Most consumers believe cloud-based apps can be hacked | |
| Most consumers concerned about becoming victims of online crime | |
| Most employees are not malicious, but their carelessness can be just as damaging | |
| Most employees don't understand the value of data | |
| Most IT pros oppose government backdoor access | |
| Most security executives lack confidence in their security posture | |
| Most vulnerabilities on enterprise networks are two years old | |
| Mozilla Embraces Private Browsing with Tracking Protection in Firefox 42 | |
| Mozilla increases rewards given out to bug hunters | |
| Mozilla Patches Bug Used in Active Attacks | |
| Mozilla Tells Symantec to Accept Google's CA Proposal | |
| Mr. Grey Hacker (Wanted by FBI) Steals 1.2 BILLION Login Passwords | Hacking |
| mSpy finally admits they've been hacked | |
| mSpy finally admits they've been hacked | |
| Musical Chairs Campaign Found Deploying New Gh0st RAT Variant | |
| My Government Doesn't Understand How Encryption and Cyber Security Work | Security |
| N3XT — Advanced CHIP that Could Make Your Computer 1000 Times Faster | Technologies |
| Naikon APT Group backed by the Chinese PLA Unit 78020 | APT |
| Naikon APT Group Tied to China’s PLA Unit 78020 | Cyber Attack |
| NASA hacked by AnonSec that hijacked a $222m Global Hawk drone | Hacking |
| NASA HACKED! AnonSec tried to Crash $222 Million Drone into Pacific Ocean | Hacking |
| Nasdaq to Use Bitcoin-style Blockchain to Record Shareholder Votes | Technologies |
| NATO Locked Shields 2017, world’s largest cyber defence exercise just ended | |
| NCA launched #CyberChoice campaign, to prevent youngsters become cyber criminals | Cyber Attack |
| Nearly 2% of all smartphones are compromised or high risk | |
| Nearly 2,000 Vodafone UK customers' accounts compromised, blocked | |
| Nearly all websites have serious security vulnerabilities | |
| Nemesis Bootkit — A New Stealthy Payment Card Malware | Virus |
| NeoKylin: China's Linux OS that Seriously Looks Like Windows XP | APT |
| Nest camera, has a different definition for Turn off Mode | Security |
| Nested backdoor affects 600,000 Arris cable modems | Virus |
| Netflix Sleepy Puppy Awakens XSS Vulnerabilities in Secondary Applications | |
| Netgear Nighthawk X4S AC2600 Smart WiFi Router released | |
| Netgear Patches RCE Flaws in Routers, Switches | |
| Netgear Published Patched Firmware for Routers Under Attack | Computer attack |
| Netgear Published Patched Firmware for Routers Under Attack | |
| Netgear Router Exploit in the wild | Hacking |
| Netrepser Cyber espionage campaign compromised hundreds of Government organizations worldwide | |
| Network protocol analyzer Wireshark 2.0 released | |
| Network security firewalls approach $1 billion in 2Q15 | |
| Network Time Protocol flaws can cause chaos on a global scale | Security |
| Neverquest Trojan Ceases Operations | |
| New "Do Not Track" standard released | |
| New "Dok" Mac OSX Malware Steals Sensitive Data | |
| New Android bug can put devices into a coma | |
| New Android malware could inflict $250,000 of losses | Android |
| New Android Ransomware Communicates over XMPP | |
| New Apple Gatekeeper bypass can allow running rouge applications | Apple |
| New Attack Targeting Microsoft Outlook Web App (OWA) to Steal Email Passwords | Computer attack |
| New attacks on critical communications infrastructure in the US | Computer attack |
| New Botnet Hunts for Linux — Launching 20 DDoS Attacks/Day at 150Gbps | BotNet |
| New Bug in Bugzilla Software Could Expose Zero-Day Vulnerabilities | Vulnerebility |
| New Campaign Shows Dridex Active, Targeting French | |
| New Cerber Ransomware Variant Emerges | |
| New date for migrating off vulnerable SSL and early TLS encryption | |
| New DDoS attacks misuse NetBIOS name server, RPC portmap, and Sentinel licensing servers | |
| New Debian Releases Fix PHP, VirtualBox Bugs | |
| New docs confirm CIA planned to kidnap Snowden | NSA |
| New Drupal versions fix admin account hijack flaw | |
| New Dyre variant can target Windows 10 and Microsoft Edge users | |
| New Dyre variant in the wild supports Windows 10 and Microsoft Edge | Android |
| New EU rules on data protection put the citizen back in the driving seat | |
| New exploit steals secret cryptographic keys from mobile devices | Mobil |
| New flash storage architecture capable of 1TB/s | |
| New Google Drive phishing campaign exposed | |
| New HackingTeam OS X RCS spyware in the wild, who is behind the threat? | Apple |
| New insidious Google Docs phishing scheme is rapidly spreading on the web | |
| New insight on the Rocket Kitten Iranian hacking crew | Hacking |
| New Joomla release patches a serious SQLi flaw | Vulnerebility |
| New law allows French police to seize and search electronic devices without a warrant | |
| New Long-Range Wi-Fi Standard Offers Double Range to Home Devices | Technologies |
| New Moker RAT Bypasses Detection | |
| New OpenSSL versions squash LogJam bug | |
| New password recovery scam hitting Gmail, Outlook and Yahoo Mail users | |
| New Persirai IoT Botnet Emerges | |
| New RAT Trochilus, a sophisticated weapon used by cyber spies | Virus |
| New SANS course teaches infosec pros how to ruin attackers' day | |
| New Spy Banker Trojan Telax exploits Google Cloud Servers | Virus |
| New Steam escrow system drives impatient users to fake trading sites serving malware | |
| New threats will demand new approaches such as micro-segmentation and quantum encryption | |
| New Tinba Variant Seen Targeting Russian, Japanese Banks | |
| New Toshiba CMOS image sensor improves recognition and authentication | |
| New updates on Cyber Conflict Agenda 2016 and what’s new in ‘Cyber power’ | REPORTS |
| New Versions of Carbanak Banking Malware Seen Hitting Targets in U.S. and Europe | |
| New York Judge Rules FBI Can't Force Apple to Unlock iPhone | Apple |
| New York Police Used Cell Phone Spying Tool Over 1000 Times Without Warrant | Mobil |
| Next Hacker to Organize Biggest Java Programming Competition In Germany | Hacking |
| Next year, smart cities will use 1.6 billion connected things | |
| Nigerian scammers are stealing millions from businesses | |
| Nine arrested in UK investigation of criminal network defrauding bank customers | |
| NIST releases SHA-3 cryptographic hash standard | |
| NIST revises security publication on random number generation | |
| NIST updates ICS security guide | |
| North Korea-Linked Hacker Group Poses Serious Threat to Banks: Kaspersky | |
| North Korea's Red Star OS (Looks Like Mac OS X) Spies on its Own People | OS |
| Notorious Shm00p hacker Claims he helped the FBI find ISIS Hacker Junaid Hussain | ISIS |
| Nový Chrome rozšíøení pomáhá v boji klávesnice Biometrické profilování | |
| Now VirusTotal can scan your firmware image for bad executables | Virus |
| Now We Know — Apple Can Unlock iPhones, Here's How to Hack-Proof your Device | Apple |
| NSA announces it will stop surveillance activities on emails, texts and other internet communications | |
| NSA broke trillions of encrypted connections due to a flaw | NSA |
| NSA Cyber Weapons installed in High Profile Targets in Greece | |
| NSA Data Center Experiencing 300 Million Hacking Attempts Per Day | NSA |
13.10.2015 | NSA SHARKSEER program aims to detect and mitigate malware Zero-Day | BigBrothers |
| NSA’s Top-Secret SKYNET May Be Killing Thousands of Innocent Civilians | NSA |
| NSA-linked Spying Malware Infected Top German Official's Computer | NSA |
| NSF Awards $6M Grants for Internet of Things Security | |
| Nuclear Exploit Kit Spreading Cryptowall 4.0 Ransomware | |
| Nuclear facilities are wide open to cyber attacks | |
| Nuclear Threat Initiative says nations not prepared to repel cyber attacks on nuclear facilities | Security |
| Number of WordPress Attacks powered by compromised routers is rapidly dropping | |
| NY Health Provider Excellus Discloses Data Breach Dating to 2013 | |
| Obama Encryption Policy: White House Will Not Force Companies To Decode Encrypted Data | Security |
| Offline Ransomware is spreading among Russian users | Virus |
| Oh Snap! Lenovo protects your Security with '12345678' as Hard-Coded Password in SHAREit | Security |
| Old MS Office feature can be exploited to deliver, execute malware | |
| OmniRat RAT is currently being used by criminals in the wild | Virus |
| On Friday, United Nation can decide that Assange is being illegally detained | News |
| On the trail of Stagefright 2 | Virus |
| Once again identity thieves use stolen SSNs in IRS attack | Computer attack |
| One in 20 apps on private PCs are end-of-life | |
| One in 600 websites exposes sensitive info via easily accessible .git folder | |
| Online summer travel scams to watch out for | |
| Online Trust Alliance releases new Internet of Things Trust Framework | |
| Only 37% of SMBs think they're equipped to manage IT security | |
| Only 5% of organizations protect credentials | |
| Open source KeeFarce tool loots encrypted passwords stored in KeePass | |
| Open source security projects get $452,000 from the Linux Foundation | |
| Open source Sleepy Puppy tool finds XSS bugs in target apps and beyond | |
| Open source tool checks for vulnerabilities on Android devices | |
| Open source Twittor tool can control botnets via Direct Messages | |
| OpenSSH 7.0 deprecates weak, legacy and unsafe cryptography | |
| OpenSSH 7.0 Fixes Four Flaws | Vulnerebility |
| OpenSSH bug enables attackers to brute-force their way into poorly configured servers | |
| OpenSSL Patches Bring Last Update for 0.9.8 and 1.0.0 Branches | |
| Operation Black Atlas, PoS malware is flooding network worldwide | Virus |
| Operation Blockbuster revealed the Lazarus Group Activities | Virus |
| Operation Dust Storm, hackers Target Japanese Critical Infrastructure | Hacking |
| Operation Transparent Tribe targets Indian diplomats and military | Security |
| Operation WilySupply – Software remote update channel of the supply chain exploited as attack vector | |
| Operational security and cybersecurity come together in Anaheim | |
| Operators behind Angler Exploit Kit included CryptoWall 4.0 | Virus |
| OpKillingBay – Anonymous shut down Japanese airport site to protest against slaughter of Dolphin | Computer attack |
| OPM hack shines light on abysmal state of US federal systems's security | |
| Oracle agrees to settle FTC charges it deceived consumers about Java updates | |
| Oracle CSO: You ‘Must Not Reverse Engineer Our Code’ | |
| Oracle Issues Emergency Java Update for Windows | Vulnerebility |
| Oracle Ordered to Publicly Admit Misleading Java Security Updates | Vulnerebility |
| Oracle releases 154 fixes, plugs click-to-play bypass Java flaw used in attacks | |
| Organizations on the hunt for DevOps, IoT and mobile skills | |
| Outsourcing critical infrastructure (such as DNS) | Security |
| Over 5,000 mobile apps found performing in-app ad fraud | |
| OwnStar Attack Now Aimed at BMW, Chrysler, Mercedes Cars | Hacking |
| PageFair Hack Serves Up Fake Flash Update to 500 Sites | |
| Pair of Bugs Open Honeywell Home Controllers Up to Easy Hacks | |
| Pair of Drupal Modules Patch Access Bypass Flaws | |
| Pangu cracking team has released the iOS 9 jailbreak | Apple |
| Paris Attacks — NO! We Can't Blame Edward Snowden and Encryption for Terror Attacks | ISIS |
| Password Security — Who's to Blame for Weak Passwords? Users, Really? | Security |
| Patent Troll — 66 Big Companies Sued For Using HTTPS Encryption | Security |
| Patch now! Adobe releases Emergency Security Updates for Flash Player | Vulnerebility |
| Patch Report: All Versions of Windows affected by Critical Vulnerability | Vulnerebility |
| Patch your Asus RT wireless routers now to avoid ugly surprises | |
| Patched Android ‘Serialization’ Vulnerability Affects 55 Percent of Devices | |
| Patched Ins0mnia Vulnerability Keeps Malicious iOS Apps Hidden | |
| Patched Libpng Vulnerabilities Have Limited Scope | |
| Patreon crowdfunding site hacked and data leaked online | Crime |
| Pawn Storm APT targets MH17 crash investigation | Virus |
| Pawn Storm used a new Flash Zero-Day in attacks on the NATO & the While House | Vulnerebility |
| Pay-by-Selfie – MasterCard is replacing the customer password with his selfie | Security |
| Payment card info of 93,000 Web.com customers stolen | Crime |
| Payment systems at Hyatt Hotels have been compromised | Hacking |
| PayPal stored XSS vulnerability exposed | |
| PayPal Vulnerability Allows Hackers to Steal All Your Money | Vulnerebility |
| PCs with Intel Server Chipsets, Launched in Past 9-Years, Can be Hacked Remotely | |
| Pentagon's unclassified email system breached, Russian hackers blamed | |
| Pen-testing drone searches for unsecured devices | |
| Persistent cyber spies try to impersonate security researchers | |
| Persistent XSS flaw in SharePoint 2013 revealed, patched | |
| Person VUE Credential manager system has been compromised | Security |
| Personal info of 12+ million Dutch mobile phone owners easily accessible to hackers | |
| Personal info of 15 million T-Mobile USA customers stolen in Experian breach | |
| Personal info of 4 million US government workers compromised in OPM breach | |
| Perspectives on the state of Internet security | |
| Phantom Squad took credit for the PlayStation network outage | Computer attack |
| Phantom Squad wants to take down Playstation network and Xbox Live on Christmas | Hacking |
| Phishers are targeting millions of DHL customers | |
| Phishers register domain names, hammer traditional targets | |
| Phishing attacks targeting businesses are escalating | |
| Phishing campaign leveraging on Dropbox targets Hong Kong media | |
| Photo gallery: Black Hat USA 2015 Business Hall | |
| Photo gallery: Black Hat USA 2015, part 2 | |
| Photo: A walk through Cyber Security Europe 2015 | |
| PHP File Manager Riddled With Vulnerabilities, Including Backdoor | |
| PIN-changing, screen-locking Android ransomware | Android |
| Pirate Bay co-founder Gottfrid Svartholm, aka Anakata, Released from Prison | REPORTS |
| PlayStation 4 Hacked to Run Linux | Hacking |
| Plex forums hacked: IPs, private messages, encrypted passwords compromised | |
| Plex forums hacked: IPs, private messages, encrypted passwords compromised | |
| Point-and-shoot weapon stops drones without destroying them | |
| Police Arrest 16-year-old Boy Who Hacked CIA Director | Crime |
| Police Arrested Hackers Who Stole Millions from European ATMs | Hacking |
| Police Body Cameras come with Conficker Worm | Virus |
| Police Can't Force You To Unlock Your Phone, It violates Fifth Amendment Rights | Security |
| Police Raid alleged Bitcoin Creator Craig Wright's Home in Sydney | Technologies |
| Police Using Planes Equipped with Dirtbox to Spy on your Cell Phones | Mobil |
| Ponmocup, never underestimate a botnet that infected 15 million PCs | Virus |
| Popular Android AppLock app full of gaping security holes | |
| Popular VPNs leak data, don't offer promised privacy and anonymity | |
| PostgreSQL 9.5: Row level security, Big Data and UPSERT | |
| Potentially backdoored AMX equipment being used by US President Obama and US Military | Security |
| President Donald Trump Fires the FBI Director James Comey | |
| Press backspace 28 times to hack a Linux PC with Grub2 | Hacking |
| Prevention is the best cure for identity theft | |
| Prices of stolen data on the Dark Web | |
| Privacy Badger 1.0 Released With Support For EFF Do Not Track Policy | |
| Privacy International helps individuals find out if they were spied on by the GCHQ | |
| Privacy profession: An equal playing field for men and women? | |
| Private email account of CIA Director compromised by teenage hackers? | |
| PrivaTegrity might bring an end to Crypto Wars | Security |
| Privatoria — Best VPN Service for Fast, Anonymous and Secure Browsing | Security |
| Privileged accounts are still easy to compromise | |
| Pro PoS — This Stealthy Point-of-Sale Malware Could Steal Your Christmas | Virus |
| Pro PoS, a new PoS malware available for sale in the underground | Virus |
| Project Cumulus – Tracking fake phished credentials leaked to Dark Web | Security |
| Project Zero Experts Found critical flaws in Samsung Galaxy S6 Edge | Vulnerebility |
| Proposed Wassenaar pact changes will harm cyber defenders instead of attackers | |
| PROTECTING CYBER VENDOR SERVICES WITH CYBERLAW | Security |
| ProtonMail Back Online Following Six-Day DDoS Attack | |
| ProtonMail paid a $6000 Ransom to stop DDoS Attacks | Computer attack |
| ProtonMail Paid Hackers $6000 Ransom in Bitcoin to Stop DDoS Attacks | Computer attack |
| ProtonMail restores services after epic DDoS attacks | |
| PwnBin: A script for scraping Pastebin for leaked API keys, SSH credentials | |
| Qualys announces free global asset inventory service | |
| Quantum Teleportation — Scientists Teleported Quantum Data over 60 Miles | Technologies |
| R.I.P Ian Murdock, Founder of Debian Linux, Dead at 42 | Technologies |
| Ransomware attacks paralyzed at least two German hospitals | Virus |
| Ransomware Attacks Threaten Wearable Devices and Internet of Things | Virus |
| Ransomware demanded $3.6M after takes offline the Hollywood Presbyterian Medical Center | Virus |
| Ransomware infected the UK Parliament’s computer networks | Virus |
| Ransomware will target also Medical Devices | Virus |
| Raspberry Pi Zero — The $5 Tiny Computer is Here | Technologies |
| RaspBSD – FreeBSD distribution for Raspberry Pi | OS |
| Ratopak Trojan – Russian banks under attack | Virus |
| Raw threat data is not effective, it's time for threat intelligence | |
| RCMP Cybercrime Strategy to fight online crimes | Security |
| Reactions to the Hacking Team breach | |
| Reactions to the IRS hack that impacted 100,000 people | |
| Reactions to the LastPass breach | |
| Real pirates used hacking techniques to raid a shipping company | Hacking |
| Real-World SS7 Attack — Hackers Are Stealing Money From Bank Accounts | |
| Recently Patched Adobe Flash Versions Hit by Another Zero-day Exploit | Vulnerebility |
| Record-Breaking Deal: Dell to Buy EMC for $67 Billion | News |
| RedLock Emerges from Stealth With Cloud Security Platform | |
| Rekoobe a new malware targeting Linux users | Virus |
| Released: New version of REMnux Linux distro for malware analysis | |
| Reminder! If You Haven't yet, Turn Off Windows 10 Keylogger Now | Windows |
| Remote working on the rise despite security concerns | |
| Remotely hacking a Nissan LEAF via vulnerable APIs | Hacking |
| Rent the infamous AlienSpy backdoor is now quite easy | Virus |
| Report: German Bank ATMs vulnerable to Hackers | Hacking |
| Report: The changing face of hacking | |
| Report: What you need to know to earn more in system administration and security | |
| Researcher hacks house arrest tracking system | |
| Researcher hacks medical devices and the whole hospital with ease | Hacking |
| Researcher proves how easy it is to pull off homographic phishing attacks | |
| Researcher releases exploit for OS X 0-day that gives root access | Apple |
| Researcher releases Free Hacking Tool that Can Steal all Your Secrets from Password Manager | Hacking |
| Researcher tests Tor exit nodes, finds not all operators can be trusted | |
| Researcher warns about Security Loopholes in Denmark's Largest Bank | Security |
| Researchers devise passive attacks for identifying Tor hidden services | |
| Researchers Discover Two New Strains of POS Malware | |
| Researchers Disrupt Angler Exploit Kit Ecosystem, Derail $30M Ransomware Campaign | |
| Researchers eliminate coding errors by using good code from "donor" apps | |
| Researchers Expose Huge Ad Scam Operation | |
| Researchers find backdoor bug in NASA rovers' real-time OS | |
| Researchers hack Corvette via SMS to plugged-in tracking dongle | |
| Researchers hack Linux-powered sniper rifle | |
| Researchers hack Vizio Smart TVs to access home network | |
| Researchers make easy work of Android lockscreen security | Android |
| Researchers map out hard-to-kill, multi-layered spam botnet | |
| Researchers point out the holes in NoScript's default whitelist | |
| Researchers spotted a new OS X scareware campaign | Apple |
| Researchers track Android users by collecting accelerator readings | |
| Researchers Uncover ‘Terracotta’ Chinese VPN Service Used by APT Crews for Cover | |
| Researchers Uncover New Italian RAT uWarrior | |
| Researchers-outline-vulnerabilities-in-yahoo-paypal-magento-apps | Vulnerebility |
| Retailers are unaware of sensitive data leaks | |
| Reuse of login credentials put more than 20M Alibaba accounts at risk | Security |
| Revealed: What info the FBI can collect with a National Security Letter | |
| Ricochet — Most Secure Peer-to-Peer Encrypted Messenger that Sends No Metadata | Security |
| 'Ridiculous' Bug in Popular Antivirus Allows Hackers to Steal all Your Passwords | Hacking |
| RIP Ray Tomlinson, The Creator of Email, Dies at 74 | Technologies |
| Risk management programs lack maturity, new strategies needed | |
| Risk managers most worried about loss of information confidentiality | |
| Risks from fraudulent mobile apps and unauthorized app stores | |
| Risky mobile behaviors are prevalent in the government | |
| Risky Schneider Electric SCADA Vulnerabilities Remain Unpatched | |
| Roaming Tiger Hackers targets Russian organizations for espionage | Hacking |
| Rockwell Patches Serious ‘FrostyURL’ PLC Vulnerability | |
| Rockwell Updates Stratix Routers to Patch Cisco IOS Flaws | |
| Rovnix malware is threatening Japanese bank customers | Virus |
| Rowhammer.js: The first remote software-induced hardware-fault attack | |
| RSA Conference 2016: Connect to protect | |
| RSA Conference Badge Scanning App has a default password hardcoded | Security |
| RSA Conference opens Innovation Sandbox Contest | |
| RSA Conference registration page asks Twitter credentials, that’s incredible! | Security |
| RSAUtil Ransomware Distributed via RDP Attacks | |
| Russia deploys jamming systems in Syria as tensions rise | Technologies |
| Russia has a new anti wiretapping System | Technologies |
| Russia Wants to Kick Foreign Tech Companies Out Of The Nation | Security |
| Russia, Hackers Stole $4 Million in cash with Reverse ATM Hack method | Hacking |
| Russian Army is largely investing in modern UAVs | Technologies |
| Russian ATM Hackers Steal $4 Million in Cash with 'Reverse ATM Hack' Technique | Hacking |
| Russian financial cybercrime: how it works | Hacking |
| Russian Hackers Manipulate Ruble-Dollar Exchange Rate with Malware | Hacking |
| Russian Hackers suspected for the intrusion of Dow Jones systems | Hacking |
| Russian Metel group manipulated ruble-dollar exchange rate with malware | Virus |
| Russian Nation-state hackers intensify operations in Syria | Hacking |
| Safe Harbor replaced with Privacy Shield | Security |
| Safeguarding data in the healthcare industry | |
| Sale of legitimate code-signing certs booms on darknet markets | |
| Salesforce Patches XSS on a Subdomain | Vulnerebility |
| Samsung announces GAIA, a Smart TV security solution | |
| Samsung disables Windows Update, undermines the security of your devices | |
| Samsung Get Sued for Failing to Update its Smartphones | Mobil |
| Samsung LoopPay Hacked, but 'Samsung Pay' is Safe | Hacking |
| Samsung Portable SSD T3 offers increased data security and portability | |
| Samsung presented GAIA, a security solution for Smart TVs | Security |
| San Bernardino shooter’s Apple ID passcode changed in government custody | Apple |
| SanDisk unveils new wireless flash drive | |
| SAP fixed a flaw in xMII that could open the door to nation-state hackers | Vulnerebility |
| SAP Patches 12 SQL Injection, XSS Vulnerabilities in HANA | |
| SAP Patches 17 security flaws, the lowest number of monthly update over the past 6 months | |
| SAP Patches 17 Vulnerabilities With May 2017 Security Update | |
| Save the Date — 11th December: Anonymous to Celebrate 'ISIS Trolling Day' | ISIS |
| Scammers exploit mobile ads for easy profit | |
| Scammers target citizens filing tax returns online | |
| Scammers use Google AdWords, fake Windows BSOD to steal money from users | |
| Scammers use Google AdWords, fake Windows BSOD to steal money from users | |
| Scan of IPv4 Space for ‘Implanted’ Cisco Routers Finds Fewer Than 100 | |
| Scanner Finds Malicious Android Apps at Scale | |
| Scottrade Breach Affects 4.6 Million Customers | |
| Script Kiddies can Now Create their Own Ransomware using This Kit | Virus |
| Seagate wireless hard drives open wide to attack | |
| Second Russian pleads guilty in record US data breach | Hacking |
| Second teen arrested in Connection with the TalkTalk breach | Security |
| Second teenager arrested in connection with TalkTalk hack | |
| Secret code in color printers enables government tracking | |
| Section 215 of the Patriot Act expired last night | |
| Secure messaging service Telegram blocks 78 ISIS-related channels | |
| Secure networks are the key to unlocking A2P potential | |
| Securing Hospitals from hackers that can put lives in dangers | Security |
| Securing the smart home environment | |
| Security concerns continue to dog the cloud industry | |
| Security experts disclosed SCADAPASS, a list of default credentials for ICS and SCADA systems | Security |
| Security experts explain to US, UK governments why mandated encryption backdoors are a bad idea | |
| Security flaws could allow attackers to steal over 100 different cars | |
| Security challenges emerging with the rise of the personal cloud | |
| Security of iMessage System Comes to the Fore Again | |
| Security pros acknowledge risks from untrusted certificates but take no action | |
| Security researcher disclosed a WordPress Password Reset Vulnerability | |
| Security Sandboxes Challenged by Evolving Malware | Technologies |
| Security testing market to grow to $6.9 billion by 2020 | |
| Security update kills several critical bugs in Android Marshmallow | |
| Security updates for OS X, iOS fix bucketload of serious bugs | |
| Sen. Warren Worried About Banks’ New Encrypted Messaging Platform | |
| Senior Bitcoin developer expects a failure of the currency | Technologies |
| Series of Buffer Overflows Plague Many Yokogawa ICS Products | |
| Serious, Yet Patched Flaw Exposes 6.1 Million IoT, Mobile Devices to Remote Code Execution | Hacking |
| Several Critical Flaws Patched in Drupal Module | |
| Severe OpenSSL bug that allows certificate forgery has been plugged | |
| SHA-2 encryption will make many sites inaccessible to users who can't afford newer tech | |
| Shadow IT is prevalent in government agencies | |
| Shedun adware can install any malicious mobile app by exploiting Android Accessibility Service | Android |
| Shifu banking trojan is officially spreading to the UK | Virus |
| Shocking! Instagram HACKED! Researcher hacked into Instagram Server and Admin Panel | Hacking |
| Shocking, Teen hacker Cracka owned head of US intelligence James Clapper | Hacking |
| Shockwave player flaw exposes 450 million users at risk of hack | Hacking |
| Shodan implements a feature to browse vulnerable webcams | Vulnerebility |
| Shoring up Tor | Security |
| Should the removal of personal info posted online be a human right? | |
| Schneider Patches Plaintext Credentials Bug in Building Automation System | |
| School monitoring software's hard-coded encryption key exposed | |
| Siemens Patches DoS Flaws in Industrial Products | |
| Signal for Android finally out, offers end-to-end encrypted calls and messages | |
| Signal secure messaging app now available on the desktop | |
| Silent Circle launches Blackphone 2, delivering business and personal privacy | |
| Silent Circle promptly patched a critical flaw in the Blackphone I | Mobil |
| Silverlight exploit discovered by analyzing Hacking Team leaked emails | Vulnerebility |
| SilverPush technology tracks user habits with near-ultrasonic sounds | Technologies |
| SIM swap fraud cases force bank to improve security | Mobil |
| Simple Yet Effective eBay Bug Allows Hackers to Steal Passwords | Hacking |
| Simply Secure offers free usability design help to developers of privacy, security tools | |
30.8.2015 | Six U.K. Teens Arrested for using Lizard Squad's DDoS Tool | |
| Skype – IP will now be hidden by default to avoid attacks | Computer attack |
| SLOTH attacks weaken secure protocols because they still use MD5 and SHA-1 | |
| Smartwatches: A new and open frontier for attack | |
| Sniffing and tracking wearable tech and smartphones | |
| Snoopers’ Charter will cause extreme rise in business costs | |
| Snooping Samsung S6 calls with bogus base stations | Security |
| Social Engineering — Free Online Training for Hackers | Security |
| Social experiment: 200 USB flash drives left in public locations | |
| Social media security is still a low priority | |
| Social Networks – A Bonanza for Cybercriminals | Social site |
| Sofacy APT hits high profile targets with updated toolset | Hacking |
| Software Download Mirror Distributes Mac Malware | |
| Solving the cybersecurity challenges of smart cities | |
| Somebody Offered Money to Raspberry Pi Foundation for Pre-Installing Malware | Virus |
| Someone could break the Bitcoin Network on demand | Security |
| Someone has pwned the Dridex botnet serving the Avira Antivirus | Virus |
| Someone Hijacks Botnet Network & Replaces Malware with an Antivirus | Virus |
| Someone Just Leaked Hard-Coded Password Backdoor for Fortinet Firewalls | Security |
| Someone Just Tried to Take Down Internet's Backbone with 5 Million Queries/Sec | Computer attack |
| Someone wants infect millions of Raspberry Pi computers | Virus |
| Sophisticated, successful Morpho APT group is after corporate data | |
| Sound-Proof: Two-factor authentication without user interaction | |
| Source code of the Android GM Bot malware was leaked online | Android |
| South Korean Child Monitoring App Beset by Vulnerabilities, Privacy Issues | |
| Spam and phishing in Q1 2017 | |
| Spam and phishing in Q3 2015 | Security |
| Spam Campaign Continuing to Serve Up Malicious .js Files | |
| SQL injection has surfaced as the no. 1 attack in 2015 | |
| SSH backdoor discovered in Fortinet FortiOS firewalls | Vulnerebility |
| Stagefright Bug 2.0 — One Billion Android SmartPhones Vulnerable to Hacking | Android |
| Stagefright Patch Incomplete Leaving Android Devices Still Exposed | |
| Stagnant budgets and rising insider security threats | |
| Stanford researchers identify potential security hole in genomic data-sharing network | |
| Starwood Hotel Chain Hit By Point of Sale Malware | |
| State-sponsored cyberattacks linked to Russian intelligence gathering | |
| Static encryption keys affect SAP security | |
| Stealing to the sound of music | Security |
| Stealthy GlassRAT Spies on Commercial Targets | |
| Stepping out of the dark: Hashcat went OpenSource | Security |
| Stolen Ashley Madison data dumped online, seems legitimate | |
| Stolen card data of 100,000 Britons for sale on the clear web | Crime |
| Stolen medical information affects 18 out of 20 industries | |
| Stolen or lost devices and the risks of remote working | |
| Stop DDoS attacks in seconds | Security |
| Strong passwords don’t matter if employees don’t secure them | |
| Study: Global cost of cyber crime | |
| Subgraph OS — Secure Linux Operating System for Non-Technical Users | OS |
| Surge in global cloud application adoption | |
| Survey: Mobile Security - Confidence ebbs as BYOD booms | |
| Surviving in an IoT-enabled world | Technologies |
| Surviving in the IoT world: Risks of smart home devices | |
| Suspicious Windows 7 Update Actually an Accidental Microsoft ‘Test’ Update | |
| Swedish Court — 'We Can't Ban The Pirate Bay' | Security |
| Swift adoption of cloud and mobile drives insider threats | |
| Symantec fires employees who issued rogue Google certificates | |
| T9000 backdoor, a sophisticated malware that spies on Skype users | Virus |
| Tails 2.0 is out to protect your privacy and anonymity | OS |
| Take note, next week update Adobe Reader and Acrobat to fix critical flaws | Vulnerebility |
| Takedown of criminal gang behind ATM malware attacks | |
| Taking root | Android |
| TalkTalk breach: Attackers demand £80,000 for stolen data | |
| TalkTalk breach: Third arrest, data already for sale, criminals targeting pensioners | |
| TalkTalk data breach, hackers compromised 4 million customer records | Hacking |
| TalkTalk Hack: Police Arrest Second Teenager in London | Hacking |
| TalkTalk hack: Teenager arrested in Northern Ireland | |
| Target Says SEC Won’t Pursue Enforcement Action as a Result of Data Breach | |
| Targeted attacks on 4Chan and 8Chan exploited bot code in Imgur | Computer attack |
| Teenage Lizard Squad hacker found guilty of 50,700 charges | |
| Tech support scammers start targeting users of Apple devices | |
| Techie Police Officer Builds a Sniffing Tool to Track Stolen Devices (based on War-Driving) | Hacking |
9.9.2015 | Techie Police Officer Builds a Sniffing Tool to Track Stolen Devices (based on War-Driving) | Hacking |
| Technical Support Scammers targets Apple users | Apple |
| Tech-savvy users are actually the worst offenders | |
| Telegram — Secret Messaging app — Shuts Down 78 ISIS Channels | ISIS |
| Telegram Android app is a stalker's dream | |
| Telegram messaging service tries to ban ISIS, but.. | ISIS |
| Tens of thousands of DVRs exposed on Internet with Hardcoded Passwords | Security |
| Terror alert spam detected by Symantec in the wild | REPORTS |
| Test your defensive and offensive skills in the eCSI Hacker Playground | |
| TGIF(P) – Thank god it’s fried phish | Phishing |
| The amazing adventures of personal data in European Union court | Security |
| The Android Bankosy malware steals banking OTPs | Android |
| The Angler Exploit Kit Exposed: Making $60 Million Annually by Delivering Ransomware | Virus |
| The Apple Gatekeeper bypassed once again by a researcher | Apple |
| The automation and industrialization of cyber attacks | |
| The average budget required to recover from a security breach | |
| The average cost of cybercrime escalates to $15 million per organization | |
| The average organization experiences 9 insider threats each month | |
| The barriers to cybersecurity research, and how to remove them | |
| The BlackEnergy malware was a key element of the Ukraine power outage | Virus |
| The Bondnet botnet- From China with Love | |
| The cyber labor market in Israel, the cyber guild | Cyber Attack |
| The danger of terror attacks using drones, and possible countermeasures | |
| The Dark web – Why the hidden part of the web is even more dangerous? | Security |
| The DoD funded the Carnegie Mellon University’s research on Tor Hacking | Hacking |
| The Dow Jones firm confirmed data breach of 3,500 Users | Hacking |
| The Dridex Banking Malware is risen, British attention | Virus |
| The Duqu 2.0 persistence module | Virus |
| The Evolution of Acecard | Mobil |
| The evolution of ransomware: From PC Cyborg to a service for sale | Virus |
| The FBI requests $38 Million to counter the threat of Going Dark | Security |
| The FBI used the NIT to de-anonymize thousand Pedos on Tor | Security |
| The Fortinet SSH backdoor found in many other products | Hardware |
| The French Gov wants to Block Tor and Forbid Free Wi-Fi | Vulnerebility |
| The French Gov will not block Tor neither Free Wi-Fi | Security |
| The future of information security in the government | |
| The GasPot experiment: Hackers target gas tanks | |
| The German intelligence agency BND resumed surveillance activities with the NSA support | NSA |
| The German Intelligence Systematically Spied on Allies | Security |
| The Hacking crew known as Gaza cybergang was very active in Q2 2015 | Hacking |
| The Hello Barbie doll, lights and shadows | Hacking |
| The changing role of the risk manager | |
| The impact of data breaches on customer loyalty | |
| The impact of digital business on information security | |
| The Infernal-Twin tool, easy hacking wireless networks | Hacking |
| The IPT ruled that GCHQ spies can legally hack any electronic devices | Hacking |
| The ISIL is trying to hack American electrical power companies | ISIS |
| The ISIS guide, how to stay secure online | ISIS |
| The ISIS has the ability to make fake Syrian passports | ISIS |
| The Jailbreaking procedure is now legal in the United States | Apple |
| The leading cause of insider threats? Employee negligence | |
| The look and feel of Infosecurity Europe 2015 | |
| The most damaging ramifications of DDoS attacks | |
| The Mysterious Case of CVE-2016-0034: the hunt for a Microsoft Silverlight 0-day | Vulnerebility |
| The mystery behind the Internet-of-Things vigilante malware | Virus |
| The new FighterPOS PoS Malware implements worm capabilities | Virus |
| The new iPhone designed by Apple will be unhackable | Apple |
| The new Nmap 7 version just released | Software |
| The North American cyber-criminal underground it’s easy to access! | Cyber Attack |
| The number of fingerprints stolen in OPM hack rose to 5.6 million | |
| The number of Governments using the FinFisher Spyware is increased | Virus |
| The official website of the popular vBulletin forum has been hacked | Hacking |
| The OSX.Dok dropper spotted installing the new Bella backdoor | |
| The privacy risks of school technology tools | |
| The Rakos botnet – Exploring a P2P Transient Botnet From Discovery to Enumeration | |
| The Ramnit Botnet is back after the law enforcement takedown | Security |
| The rapid growth of the bug bounty economy | |
| The Rapid Increase in the Sophistication of Exploit Kits | Security |
| The return of HackingTeam with new implants for OS X | Apple |
| The rise of .NET and Powershell malware | Virus |
| The rise of artificial intelligence technologies | Technologies |
| The rise of mobile transactions and online lending fraud | |
| The rise of repeated "low and slow" DDoS attacks | |
| The rise of the Japanese Cybercrime Underground | Crime |
| The security community's reaction as CISA passes US Senate | |
| The senior advisor behind Silk Road has been arrested | Hacking |
| The Shade Encryptor: a Double Threat | Virus |
| The Shopify commerce platform is open to RFD attacks | Computer attack |
| The Signal app is available in beta version | Android |
| The Smurf Suite – GCHQ can hack your phone with a text message | Security |
| The Snake APT Group is preparing its offensive against high-profile Mac users | |
| The Sony PlayStation Network is down worldwide | Hacking |
| The state of the mobile ecosystem | |
| The Supply chain of the HandBrake Mac software compromised to spread Proton malware | |
| The surveillance firm Hacking Team is back stronger than before | Security |
| The top 7 improvements in Nmap 7 | |
| The Tor Project announces bug bounty program | |
| The Tor Project Is launching the Tor Bug Bounty Program | Security |
| The Trojan Games: Odlanor malware cheats at poker | Virus |
| The unstoppable rise of DDoS attacks | |
| The US DoD still uses SHA-1 signed certificates for use by military agencies | Security |
25.9.2015 | The US military is still sending un-encrypted emails | Kryptografie |
| The value in vulnerability management platforms | |
| The value of threat intelligence | |
| The Website of the Norwich airport hacked, a cue to reflect | Hacking |
| The World's First $9 Computer is Shipping Today! | Technologies |
| The worst data disasters from 2015 | |
| Theoretical computer science provides answers to data privacy problem | |
| These Top 10 Programming Languages Have Most Vulnerable Apps on the Internet | Vulnerebility |
| These Top 30 Ashley Madison Passwords are just as Terrible as You'd Think | Hacking |
13.9.2015 | These Top 30 Ashley Madison Passwords are just as Terrible as You'd Think | Hacking |
| These Top 7 Brutal Cyber Attacks Prove 'No One is Immune to Hacking' — Part I | Cyber Attack |
| These Top 7 Brutal Cyber Attacks Prove 'No One is Immune to Hacking' — Part II | Cyber Attack |
8.9.2015 | These Top 7 Brutal Cyber Attacks Prove 'No One is Immune to Hacking' — Part II | Cyber Attack |
| They Named it — Einstein, But $6 Billion Firewall Fails to Detect 94% of Latest Threats | Security |
| Think twice about Android root | |
| Third suspect arrested in connection with the TalkTalk breach | Security |
| This Android Malware Can Root Your Device And Erase Everything | Android |
| This Computer Chip Self-Destructs in 10 Seconds (On Command) to keep Secrets Safe | Hardware |
| This Creepy App Captures Users' Private Moment Photos and Blackmails for Money | App |
8.9.2015 | This Creepy App Captures Users' Private Moment Photos and Blackmails for Money | App |
| This is How Tokyo Police Catching Rogue Drones in the Sky | Security |
| This Malware Can Delete and Replace Your Entire Chrome Browser with a lookalike | Virus |
| This Malware Can Secretly Auto-Install any Android App to Your Phone | Android |
| This 'Radio Wave' Hack allows Hackers to Control Your Phone From 16 Feet Away | Hacking |
| This Secure Operating System Can Protect You Even if You Get Hacked | Security |
| Thousands of Devices Hacked by Rakos Botnet | |
| Thousands of Hacked WordPress Sites Abused to Infect Millions of Visitors | Crime |
| Thousands of Magento websites compromised to serve malware | Virus |
| Thousands of WordPress websites used as a platform to launch DDOS | Hacking |
| Thousands of Zhone SOHO routers can be easily hijacked | |
| Thousands stolen identities of Britons available on the Darkweb | Hacking |
| Threat actors hacked the popular Touchnote company | Hacking |
| Threat actors leverage the KONNI Malware to target organizations linked to North Korea | |
| Threat and vulnerability management market revenue to reach $5.3 billion | |
| Threat intelligence: Sources, sharing, utilization and the government | |
| Three indicted in largest theft of customer data from a U.S. financial institution in history | |
| Three men charged for the attack on the JPMorgan Chase | Hacking |
| Three simple ways to prevent a data breach | |
| Thunderstrike 2 OS X Firmware Attack Self-Replicates to Peripherals | |
| Time to update your Veeam to fix a VeeamVixProxy Vulnerability | Vulnerebility |
| Time Warner Cable security breach may have exposed 320K customers | Hacking |
9.10.2015 | Tips and Tricks to Hide from Big Brother’s Watchful Eye | BigBrothers |
| Tips for implementing a converged infrastructure | |
| Tips for managing and securing SSH keys | |
| Tis the season for shipping and phishing | Security |
| TLS Implementations Vulnerable to RSA Key Leaks | |
| T-Mobile customer data stolen from Experian already for sale | |
| To pay or not to pay – the dilemma of ransomware victims | Virus |
| Today NSA has Stopped its Bulk Phone Surveillance Program | NSA |
| Too many vulnerable medical systems can be found online | |
| Top 10 — 2016 New Year's Resolutions for Cyber Security Professionals | Security |
| Top 10 technology challenges for IT audit professionals | |
| Top 10 U.S. cities for online fraud | |
| Top 8 Cyber Security Tips for Christmas Online Shopping | Cyber Attack |
| Top cloud security issue? Lack of visibility | |
| Top IoT concerns? Data volumes and network stress | |
| Top Obama Officials to Testify on Russian Election Interference | |
| Top obstacles to EMV readiness | |
| Top strategic IT predictions for 2016 and beyond | |
| Top tips on safe online banking from the comfort of your home | Security |
| Tor Project claims FBI paid university researchers $1m to unmask Tor users | |
| Tor Project to Start Bug Bounty Program — Get Paid for HACKING! | Security |
| Tor Releases Anonymous Instant Messenger. Here's How to Use It | Security |
| Tor security improves as .onion becomes a special-use domain name | |
| Tor: FBI Paid CMU $1 Million to De-Anonymize Users | |
| TorMail hack, FBI surgical operation, or dragnet surveillance? | Security |
| Torrent websites infected 12 million Internet users per month | Virus |
| Total cost of average data breach reaches $3.8 million | |
| Toymaker VTech Hack Exposes 4.8 Million Customers, including Photos of Children | Crime |
| Tracking Hacker Forums with Traffic Analysis | Computer attack |
| Travel smart: Tips for staying secure on the road | |
| Travel Tech Giant Sabre Investigating Data Breach | |
| Travel Tech Giant Sabre suffered a Data Breach, traveler data potentially at risk | |
| Trends that will alter the way IT is consumed in 2016 | |
| TrickBot is a rising threat, the banking Trojan now targets Private Banking | |
| TrickerBot Trojan Targets Private Banking | |
| Trident nuclear weapons system could be vulnerable to cyber attacks | Vulnerebility |
| Trojanized adware: already infected more than 20,000 Android Apps | Virus |
| Trojanized versions of 20,000 popular apps found secretly rooting Android devices | |
| TrueCrypt Encryption Software Has Two Critical Flaws: It's time to Move On | Vulnerebility |
| TrueCrypt is safer than previous examinations suggest | Open source |
| Trump Fires FBI Director James Comey | |
| Trump Fires FBI Director Over Clinton Probe, Amid Russia Investigation | |
| Turing Award — Inventors of Modern Cryptography Win $1 Million Cash Prize | Security |
| Turkey banned Wikipedia because its content web contents that represents a threat to national security | |
| Turkish hackers took over a Russian Govt Instagram account | Hacking |
| Turkish officers are in contact with members of the ISIS | ISIS |
| Turkish systems under attack. Is it information warfare? | Cyber Attack |
| Turla APT Group Abusing Satellite Internet Links | APT |
| Turla Cyberspies Developing Mac OS X Malware | |
| Turris Omnia Security Project protects home network users | Technologies |
| Twitter Open Sources 'Diffy' that Automatically Catches Potential Bugs in Code | Social site |
| Twitter users warned about being targeted by state-sponsored attacks | |
| Twitter warns victims of state-sponsored attacks | Social site |
| Twittor tool uses Twitter direct messages to control botnets | Security |
| Two thirds of the Android devices are vulnerable to Lockdroid ransomware | Android |
| Two Years to General Data Protection Regulation Compliance | Security |
| U.S. Alerted France to Russia Hack Targeting Macron: NSA | |
| U.S. charges a suspect with cyber terrorism for the first time | Cyber Attack |
| UDP-based Portmap latest target for DDoS attackers looking to amplify attacks | |
| uh-oh! North America Runs Completely Out of IPv4 Internet Addresses | Technologies |
| UK ANPR systems are one of the ‘world’s biggest surveillance systems’ | Vulnerebility |
| UK businesses ‘number one target for cybercriminals’ | Hacking |
| UK dating fraud victims lost £33,5 million last year | |
| UK Gov could hack children’s smart toys to Spy on suspects | Hacking |
| UK Government’s secret programme for mass surveillance on internet and phones leaked | |
| UK High Court declares emergency surveillance bill unlawful | |
| UK job recruiters network hit by hacker, user info dumped online | |
| UK workers are significantly lacking in security awareness | |
| UK, US law enforcement agencies disrupt Dridex botnet | |
| UK’s NCA calls for global approach to cybercrime | Crime |
| Unauthorized code found in Juniper’s firewall OS | Cyber Attack |
| United Airlines hacked by same group that breached Anthem and OPM | |
| United Nations Rules in Favor of WikiLeaks Founder Julian Assange | News |
| Unity Game Engine Forum Hacked | |
| University implies they helped FBI break Tor protection because of a subpoena | |
| Unpatched Drupal flaws open websites to attacks | Computer attack |
| Unpatched OS X, iOS flaws allow password, token theft from keychain, apps | |
| Unpatched Wordpress Flaw Could Allow Hackers To Reset Admin Password | |
| Unpatched WordPress Password Reset Flaw Disclosed | |
| Unsafe password policies leave shoppers vulnerable | |
| Unsupported Honeywell Experion PKS Vulnerable to Public Attacks | |
| Unsurprisingly, companies are not protecting personal information | |
| Unsurprisingly, most would support eliminating passwords | |
| Untethered Jailbreak for iOS 9.0, 9.0.1 and 9.0.2 Released | Apple |
| Unusual Re-Do of US Wassenaar Rules Applauded | |
| Upcoming trends in the SIEM market | |
| Updated Cryptowall Encrypts File Names, Mocks Victims | |
| Updated DGA Changer Malware Generates Fake Domain Stream | |
| Updated Rig Exploit Kit Closing in on 1 Million Victims | |
| Updated XcodeGhost Adds iOS9 Support | |
| UPnP Trouble Puts Devices Behind Firewall at Risk | Computer attack |
| Uptick in Neutrino Exploit Kit Traffic Doesn’t Mean Angler Reign Over | |
| US Air Force Wireless hacking in Flight | Security |
| US and UE, a joint effort against the Dridex Botnet | Security |
| US Army Experts Call for military bug bounty program AVRP | Vulnerebility |
| US DoD invites a restricted number of hackers to Hack the Pentagon | Hacking |
| US DOJ admits that Stingrays can be used to intercept call and SMS content | |
| US Eavesdropping on Netanyahu Communications | Security |
| US Energy Department's systems breached 159 times in four years | |
| US Intelligence confirms the ISIS used chemical weapons | ISIS |
| US Intelligence Chief Hacked by the Teen Who Hacked CIA Director | NSA |
| US Judge requests Apple to unlock San Bernardino shooter’s iPhone | Apple |
| US Library of Congress makes tinkering with your car software legal | |
| US NSA Spy Agency Halts Controversial Email Sweep | |
| US OPM takes vulnerable background investigation portal offline | |
| US OPM takes vulnerable background investigation portal offline | |
| US Ports – Cyber attacks can cause the release of dangerous chemicals | Cyber Attack |
| US starts cyber operations against the ISIL in Mosul | ISIS |
| US state police cars are vulnerable to cyberattack | Cyber Attack |
| US will revise Wassenaar pact changes | |
| US, UK spies reverse-engineered security software in search for flaws | |
| USB Killer 2.0 – How to easily burn a PC with a USB device | Security |
| USB Killer 2.0: A harmless-looking USB stick that destroys computers | |
| Use of acid and lasers to access data stored on iPhones | Apple |
| Users find backdoors to do their job | |
| Users force LinkedIn to bring back connections download tool used by scrapers | |
| Using BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks | Computer attack |
| Using SimpliSafe Home Security? — You're Screwed! It's Easy to Hack & Can't be Patched | Security |
| Using the Microsoft EMET security tool to hack itself | Security |
| Utah systems experiences 300k hacking attacks a day due to the presence of the NSA Data Center | NSA |
| Valasek: Today’s Furby Bug is Tomorrow’s SCADA Vulnerability | Vulnerebility |
10.9.2015 | Valasek: Today’s Furby Bug is Tomorrow’s SCADA Vulnerability | Vulnerebility |
| Valve Patches Password Reset Vulnerability in Steam | |
| Variety Jones, A Senior Adviser to Silk Road arrested in Thailand | Hacking |
| vBulletin security patches and zero-day exploit available online | Vulnerebility |
| vBulletin, Foxit forums hacked, attacker exploited a zero-day flaw? | |
| Vegan and BeEF clash shows how cyber arms race never stops | |
| VeraCrypt Patched Against Two Critical TrueCrypt Flaws | |
| Verizon and Splunk deliver actionable threat intelligence | |
| Victims of June OPM Hack Still Haven’t Been Notified | |
| Victims of the Gomasom Ransomware can now decrypt their files for free | Virus |
| Video training course: Computer and hacking forensics | |
| Video training course: Penetration testing and ethical hacking | |
| Video: General Data Protection Regulation, Safe Harbor Agreement, Copyright reform and the Google case | |
| Vigilante Hackers Aim to Hijack 200,000 Routers to Make Them More Secure | Security |
| Virus Bulletin 2015 | Virus |
| Virus Bulletin small talk: Diversity in tech | REPORTS |
| Viruses, bulletins, surveys, and gender: hashtag #VB2015 | Virus |
| VirusTotal Adds Sandbox Execution for OS X Apps | |
| VirusTotal now Scans Mac OS X Apps for Malware | Android |
| Vision for a new generation of experimental cybersecurity research | |
| Vizio Smart TVs track your viewing habits, info is sold to third parties | |
| VMware Patches Pesky XXE Bug in Flex BlazeDS | |
| Voice as a threat: VoLTE, a new tool to compromise mobile networks | Security |
| VPN protocol flaw allows attackers to discover users' true IP address | |
| VPN users be aware , Port Fail flaw can reveal your identity | Security |
| VTech data breach gets worse: Children's pictures and chat logs were also compromised | |
| Vtech hacked, data of thousands of kids exposed | Hacking |
| Vulnerabilities Identified in Dolphin, Mercury Android Browsers | |
| Vulnerabilities in 2015: 0-days, Android vs iOS, OpenSSL | |
| Vulnerabilities in security software leave users open to attacks | |
| Vulnerability Allowed Hackers to Steal iCloud Keychain Secrets | |
| Vulnerability and configuration management for Amazon Web Services | |
| Vulnerability Identified in Genomic Data Sharing Network | |
| Vulnerability management embraces new functions | |
| Vulnerable gambling apps put corporate data at risk | |
| Vulnerable medical equipment details disclosed online | Vulnerebility |
| Vuvuzela: An untraceable messaging system aimed at thwarting powerful adversaries | |
| VXE Flaw allowed threats to bypass FireEye detection engine | Vulnerebility |
| Výzkumníci Manipulovat pušky Precision Cílení System | |
| w00t! Google OnHub Router actually Runs on Chrome OS; Here's How to Root it | Security |
| W3C to make payments easier and more secure | |
| Waiting for a court ruling, a New York Judge rejected FBI request to unlock an iPhone | Apple |
| Wanna Mine Bitcoins Faster? Researchers Find New Way to Do it | Technologies |
| Want WhatsApp Free Video Calling? This Leaked Screenshot Reveals Upcoming Feature | Security |
| Wargame teaches senior leaders about strategic threats and risks | |
| Warning — People are Sharing a Link that will Crash and Reboot your iPhone | Apple |
| Warning — Popular 'Hot Patching' Technique Puts iOS Users At Risk | Apple |
| Warning — Setting This Date On iPhone Or iPad Will Kill Your Device Permanently | Apple |
| Warning! — Linux Mint Website Hacked and ISOs replaced with Backdoored Operating System | Hacking |
| Warning! Don't Click that Google Docs Link You Just Received in Your Email | |
28.8.2015 | Warning! How Hackers Could Hijack Your Facebook Fan Page With This Trick | |
| Warning! Popular Apple Store Apps Infected with Data-Theft Malware | Virus |
| Warning! Seagate Wireless Hard Drives Have a Secret Backdoor for Hackers | Vulnerebility |
8.9.2015 | Warning! Seagate Wireless Hard Drives Have a Secret Backdoor for Hackers | Vulnerebility |
| Warning: 18,000 Android Apps Contains Code that Spy on Your Text Messages | Android |
| Washington state sues iYogi tech support firm for scamming users | |
| WD self-encrypting hard drives | |
| Wealth of personal data found on used electronics purchased online | |
1.9.2015 | Weaponized Drones For Police Now Legal In North Dakota | |
| Web Hosting Service 000webhost Hacked, Information of 13 Million Leaked | |
| Web.com Loses 93,000 Credit Card Numbers in Breach | |
| Website of Popular Mac Software Hacked to Spread Malware | |
| Week in review: Android ransomware multiplies, FireEye censors researcher | |
| Week in review: Apple tackles XcodeGhost malware, AVG will sell user data, iOS 9 exploit is worth $1 million | |
| Week in review: Criminals hacked chip-and-PIN system, secret code in printers allows tracking, and insecure | |
| Week in review: Criminals hacked chip-and-PIN system, secret code in printers allows tracking, and insecure WD self-encrypting hard drives | |
| Week in review: DDoS attack on ProtonMail, 0-days found in Samsung Galaxy S6 Edge | |
| Week in review: Dell computers shipped with root CA cert and private key, analytics services tracking users via Chrome extensions | |
| Week in review: Drone detection, crypto wars, and tracking wearable tech | |
| Week in review: Emergency patches for actively exploited flaws, HTML5 can be used to hide malware | |
| Week in review: First ever EU rules on cybersecurity, insider threats, and the new issue of (IN)SECURE Magazine | |
| Week in review: Hiding exploit code in images, online summer travel scams, and Infosecurity Europe 2015 | |
| Week in review: Information the FBI can collect with NSLs revealed, VPN protocol flaw gives away users' true IP address | |
| Week in review: iOS malware compromising Apple accounts, and fake recruiters on LinkedIn targeting infosec pros | |
| Week in review: Linux ransomware, university researchers unmask Tor users, and how one man changed the way we understand SSL | |
| Week in review: Logjam bug, trojanized PuTTY, and the importance of encryption and key management | |
| Week in review: Mainframe security, cross-device tracking, and how online fraud will evolve in 2016 | |
| Week in review: Malicious Cisco router implants, .onion becomes a special-use domain name, and the new issue of | |
| Week in review: Malicious Cisco router implants, .onion becomes a special-use domain name, and the new issue of (IN)SECURE Magazine | |
| Week in review: New C++ bugs, preventing insider threats, and gamifying threat detection | |
| Week in review: New OS X threats, and how to protect your privacy on Windows 10 | |
| Week in review: Popular VPNs leaking data, and the new issue of (IN)SECURE Magazine | |
| Week in review: Rethinking security, LastPass breach, and stronger data protection rules for Europe | |
| Week in review: ScreenOS backdoor, Twitter warns about state-sponsored attacks, and MacKeeper data breach | |
| Week in review: SLOTH attacks, JavaScript-based ransomware, and hacking medical implants | |
| Week in review: The evolution of the CISO, a simple Gatekeeper bypass, and Stagefright 2.0 | |
| Week in review: The price of the Internet of Things, YiSpecter hits non-jailbroken iOS devices, and the most secure | |
| Week in review: The price of the Internet of Things, YiSpecter hits non-jailbroken iOS devices, and the most secure Android smartphones | |
| Week in review: TLS security, malicious Tor exit nodes, how to find a free, secure proxy service | |
| Week in review: Tools for detecting Hacking Team spyware, vulnerable Smart Home Hubs, | |
| Week in review: Tools for detecting Hacking Team spyware, vulnerable Smart Home Hubs, and the most sophisticated Android malware ever exposed | |
| Week in review: WhatsApp data collection, roadblocks to implementing CISA, and how US law enforcement uses Stingrays | |
| Week in review: WiFi jamming, Flash zero-day actively exploited, and abusing the Internet of Things | |
| Week in review: Windows 10 security features, and thwarting user profiling based on typing behavior | |
| Well-informed tech support scammers target Dell users | |
| Western Digital self-encrypting hard drives are completely insecure | |
| Western Digital self-encrypting hard drives are not secure | Hacking |
| What Can be Expected in Trump's Cybersecurity Executive Order? | |
| What can we expect from 2016? A growth in online extortion, hacktivism and mobile malware | |
| What drives employees to shadow IT? | |
| What is a secure OS? | Security |
| What is Threat Intelligence and How It Helps to Identify Security Threats | Security |
| What You Should Know about Triangulation Fraud and eBay | Security |
| What's burning up resources for IT pros during the summer? | |
| WhatsApp Blocks Links to Telegram Messenger (Its biggest Competitor) | Security |
| WhatsApp collects phone numbers, call duration, and a lot of metadata | Security |
| WhatsApp collects phone numbers, call duration, and more! | |
| WhatsApp to Share your Personal Data With Facebook | Social site |
| When a 'Hacker News' Reader Tricked Me into visiting this Amazing Site (Don't Click at Work) | Security |
| When hacking saves lives: Hacking medical devices and implants | |
| When it comes to breaches, time is the biggest challenge | |
| When working is more than just business | News |
| WHID Injector: How to Bring HID Attacks to the Next Level | |
| Which Android smartphones are most secure? | |
| Which are most used passwords in opportunistic criminal attacks? | Hacking |
| Which are principal cybercriminal ecosystems in the Deep Web? | Crime |
| White House Says No Thanks to Snowden Pardon Petition | |
| White House Support for CISA Worries Privacy Advocates | |
| Whitepaper - Breach Response: How to Prepare for the Inevitable | |
| Whitepaper: 10 key questions to ask when selecting a cloud service | |
| Whitepaper: 10 things your next firewall must do | |
| Whitepaper: 5 ways to take a collaborative approach to IT security | |
| Whitepaper: Anatomy of a Healthcare Data Breach | |
| Whitepaper: Cyber Security Best Practices | |
| Whitepaper: Using micro-segmentation to make cybersecurity work | |
| Who fixes the most vulnerabilities? | |
| Who Hacked French President-elect Emmanuel Macron's Campaign? | |
| Who is behind the hack of Uber’s driver database? | Hacking |
| Who is the unknown buyer that bought Adblock Extension | Technologies |
| Who planted the backdoors in Juniper's firewalls? | |
| Who planted the Juniper ScreenOS Authentication Backdoor? | NSA |
| Why background screening is vital for IT security | |
| Why enterprise security priorities don't address the most serious threats | |
| Why improving cyber resilience is key | |
| Why parents must teach their children about internet security | Security |
| Why PS4 is not so secure for the ISIS members’ communication? | ISIS |
| Why Ransomware Will Continue to Rise in 2015 | Virus |
| Wi-Fi HaLow to extend Wi-Fi solutions for the Internet of Things | |
| WiFi jamming attacks more simple and cheaper than ever | |
| WiFi jamming, too easy and cheap to run attacks | Security |
| Wikileaks – NSA tapped world leaders for US geopolitical Interests | NSA |
| WikiLeaks Details MitM Attack Tool Used by CIA | |
| Wikileak's Julian Assange Could Be Set Free On Friday by United Nation | News |
| WikiLeaks leaked documents that detail the Archimedes tool used by the CIA in MitM attacks | |
| WikiLeaks obtains CIA Director's Hacked Emails and Plans to Publish them Shortly | Security |
| WikiLeaks publishes documents stolen from CIA director's email account | |
| WikiLeaks publishes reports showing NSA spied on French presidents | |
| Wikileaks releases CIA Director John Brennan emails | Security |
| Wikileaks Unveils CIA's Man-in-the-Middle Attack Tool | |
| Will 2016 be the year of the 100G network? | |
| Will 2016 mark the end of the Advanced Persistent Threat? | |
| Will the 2016 US presidential campaign get hacked? | |
| WIN $1 Million Bounty For Hacking the New iOS 9 iPhone | Apple |
| Windows 10 Sends Your Data 5500 Times Every Day Even After Tweaking Privacy Settings | Security |
| Windows 10 Started Showing Ads on LockScreen — Here's How to Turn It OFF | Security |
| Windows 10 Upgrade Become More Creepy, No Option to Opt-Out | Windows |
| Windows 10 Upgrade Spam Carries CTB-Locker Ransomware | |
| Windows Bitlocker disk encryption could be easily bypassed | Security |
| Windows Live ID scam targets personal information | |
| Windows machines stop trusting Dell's two unconstrained root CA certs | |
| Windows Phone hacked with Windows Phone Internals | Hacking |
| WinRAR zero-day open million users to hack | Vulnerebility |
| With Its First Android app, Apple tried to Kill Android Community, But Failed Badly! | Android |
| With unprotected keys and certificates, businesses lose customers | |
| Women represent only 10% of the infosec workforce | |
| WordPress 4.2.4 fixes critical vulnerabilities | |
| WordPress Attacks Powered by Router Botnet Drop Rapidly | |
| WordPress Patches Critical XSS Vulnerability in All Builds | |
| WordPress Patches Serious Shortcodes Core Engine Vulnerability | |
| WordPress Security: Brute Force Amplification Attack Targeting Thousand of Blogs | Computer attack |
| World's 9 Biggest Banks to adopt Bitcoin's Blockchain Technology | Technologies |
| Worldwide IT spending to decline 5.5 percent in 2015 | |
| Would Encryption Backdoor Stop Paris-like Terror Attacks? | Virus |
| WP Engine breached, forces users to change their passwords | |
| Writing Advanced OS X Malware an ‘Elegant’ Solution to Improving Detection | |
| xboxlive digital certificate exposed opens users to MITM attacks | Computer attack |
| XCodeGhost Attack – Is Apple’s Biggest Hack Ever linked to the US Intelligence? | Computer attack |
| XcodeGhost iOS Malware Contained | |
| Xen Patches VM Escape Flaw | Vulnerebility |
| Xen Project plugs critical host hijacking flaw, patch ASAP | |
| XOR DDoS botnet launching attacks from compromised Linux machines | |
| XSS, SQLi bugs found in several Network Management Systems | Vulnerebility |
| Yahoo awarded $7,000 a bug hunter for Flickr account hijacking vulnerability | |
| Yahoo Awards $7,000 for Flickr Account Hijacking Flaws | |
| Yahoo Hires Bob Lord as its CISO | |
| Yahoo open-sources Gryffin, a large scale web security scanning platform | |
| Yahoo Paid Out $2 Million in Bug Bounty Program | Security |
| Yahoo to Warn Users of State-Sponsored Attacks | BigBrother |
| Yahoo touts Úspìch Bug Bounty Programu | Security |
| Yahoo! Launches Free Web Application Security Scanner | Open source |
5.10.2015 | YiSpecter — First iOS Malware that Attacks both: Non-jailbroken and Jailbroken Devices | iOS |
| YiSpecter iOS Malware Abuses Apple Enterprise Certs to Push Adware | iOS |
| YiSpecter iOS Malware can infect any Apple iOS device | Apple |
| You can buy a Cryptolocker/Cryptowall Ransomware Kit for $3,000 | Virus |
| You can Hack into a Linux Computer just by pressing 'Backspace' 28 times | Hacking |
| You Can Hack Your Own Car — It's Legal Now | Security |
| You can’t be invulnerable, but you can be well protected | Vulnerebility |
| You need just $8,000 to exploit a zero-day in a critical infrastructure | Hacking |
| You’re Paying for Your Starbucks, One Way or the Other | Crime |
| Your GPS Location and Calls Can be Spied Using Network Vulnerability | Vulnerebility |
| Zero Day in Android’s Google Admin App Can Bypass Sandbox | Vulnerebility |
| Zero knowledge proof as an enabler for Cyber weapon information sharing | Cyber Attack |
| Zero Trust approach to network security | Security |
| Zero-day disclosure-to-weaponization period cut in half | Vulnerebility |
| Zero-day disclosure-to-weaponization period cut in half | Vulnerebility |
| ZeroDB, the end-to-end encrypted database, goes open source | Security |
| Zerodium Hosts Million-Dollar iOS 9 Bug Bounty | Apple |
| Zerodium offers $100,000 for bypass Flash Player heap isolation | Security |
| Zerodium Offers $100,000 for Flash Zero-Day Exploit that Bypasses Mitigations | Security |
| Zerodium price list for secret Hacking methods | Security |