View Full Version : IT Security Alerts

Pages : [1] 2 3 4

  1. FTC wants to be enforcer of data security
  2. US NSA debates amnesty for Edward Snowden
  3. Bogus antivirus program uses a dozen stolen signing certificates
  4. Attackers exploited ColdFusion vulnerability to install Microsoft IIS malware
  5. Typosquatters and fraudsters still exploiting antivirus brands, analysis finds
  6. Mass surveillance prompts IETF work on SSL deployment guidelines
  7. Snowden speech to EU parliament could torpedo US trade talks
  8. German coalition favors German-owned or open source software, aims to lock NSA out
  9. Lessons for CSOs in Snowden exploit of NSA networks
  10. How to trace a stolen MacBook: use Find My Mac to find stolen MacBook
  11. Android botnet stole SMSes from South Korea, emailed them to China
  12. Obama to meet tech leaders on Healthcare.gov site, surveillance
  13. Judge pulls no punches in ruling against NSA program
  14. 5 Tips to Keep Your Data Secure on the Cloud
  15. DOJ defends NSA phone records program after judge's ruling
  16. Most iPhone users have activation lock enabled, survey finds
  17. Fortinet sues Sophos over alleged employee poaching
  18. Federal CIOs Look to Speed Tech Development Cycle
  19. Court's NSA ruling sets stage for contentious battle over surveillance
  20. Smart devices get smarter, but still lack security
  21. Target customers' card data said to be at risk after store thefts
  22. Washington Post reports servers attacked, suspects Chinese hackers
  23. NSA task force to recommend major changes in surveillance
  24. The 8 hottest security stories of 2013
  25. New DDoS malware targets Linux and Windows systems
  26. 5 strategies for post-holiday BYOD problems
  27. Good guys should compete with criminals in buying zero-day vulnerabilities, report sa
  28. Phishing messages fall markedly in 2013 despite better targetting
  29. Google fined by Spanish data protection authority over privacy policy
  30. Proposed California law would mandate smartphone kill switch
  31. Older Mac webcams can spy without activating warning light, researchers find
  32. Gotcha! FBI launches new biometric systems to nail criminals
  33. Unique malware evades sandboxes
  34. Target says 40 million cards likely skimmed in security breach
  35. Police arrest new suspect in 2011 'student loans' phishing attack
  36. BitTorrent develops secure, decentralized chat program using public-key crypto
  37. Debate over NSA surveillance shifts with judge's ruling, task force report
  38. Inside knowledge likely in Target breach, experts say
  39. Cryptolocker ransom Trojan infected 250,000 PCs, Dell SecureWorks estimates
  40. DDoS blackmailers branded 'playground bullies' for attack on casino firm
  41. RSA keys snatched by recording CPU sounds with a phone
  42. NSA defends foreign surveillance after new reports of targets
  43. Bundling of Chinese app store in new iOS 7 untethered jailbreak sparks controversy
  44. Report on NSA 'secret' payments to RSA fuels encryption controversy
  45. U.S. government moves to block further litigation in NSA surveillance cases
  46. Security industry tainted in latest RSA revelations
  47. Web server malware for Nginx, Apache advertised on underground market
  48. Security researcher cancels talk at RSA conference in protest
  49. Cloud-based security services poised for rapid growth
  50. Target hackers try new ways to use stolen card data
  51. 10 Stories That Shaped Tech Policy in 2013
  52. Senators call on FTC to investigate Target breach
  53. 3 Ways Enterprise IT Will Change in 2014
  54. Edward Snowden's Christmas message: a child born today will have no conception of pri
  55. Attackers could match phone numbers to Snapchat accounts, researchers say
  56. French authorities requested 6,145 phone and data taps in 2012
  57. Mobile management: InfoWorld's expert guide
  58. Judge rules NSA's phone data collection program is legal, tosses ACLU suit
  59. Target confirms customer PINs were taken in breach, but says data is safe
  60. 7 sneak attacks used by today's most devious hackers
  61. Report: NSA intercepts computer deliveries to plant spyware
  62. Spanish police arrest eight in $45 million global ATM fraud
  63. The security industry found its dream enemy in 2013 -- and new technical challenges t
  64. Cloud computing 2014: Moving to a zero-trust security model
  65. US judge dismisses challenge to border laptop searches
  66. Report: NSA developed software for backdoor access to iPhones
  67. Apple, Cisco, Dell unhappy over alleged NSA back doors in their gear
  68. Skype's social media accounts targeted by hacker group
  69. Hackers claim to expose phone information of 4.6 million Snapchat users
  70. Facebook faces lawsuit for allegedly scanning private messages
  71. Report: NSA looking to crack all encryption with quantum computer
  72. FireEye buys Mandiant for nearly $1 billion to stamp out cyber attacks
  73. ACLU appeals judge's decision to throw out NSA lawsuit
  74. Will teens be scared off by Snapchat hack? Probably not
  75. Appeals court again nixes Google's bid to overturn Street View case
  76. 5 more post-holiday BYOD strategies and considerations
  77. Snapchat breach seen as startup growing pains
  78. No hypervisor vulnerability exploited in OpenSSL site breach
  79. Thanks to the NSA, quantum computing may some day be in the cloud
  80. Surveillance court renews NSA phone records program
  81. Costs of NSA phone records collection program outweigh the benefits
  82. DOJ will appeal judge's ruling against NSA phone program
  83. Facebook made of Teflon when it comes to privacy, analysts say
  84. Malware delivered to thousands via ads on Yahoo.com
  85. Privacy suit against Facebook a warning for businesses
  86. Malware from Yahoo ads did not affect US and Mac and mobile users
  87. Trojan program hijacks World of Warcraft accounts despite two-factor authentication
  88. Talk of cyberwarfare meaningless to many companies, experts say
  89. Palo Alto Networks acquires security startup Morta to outsmart hackers
  90. Palo Alto Networks acquires stealthy start-up with NSA roots
  91. Cryptolocker scrambles eight years of data belonging to US town hall
  92. Cybercrooks developing dangerous new file-encrypting ransomware, researchers warn
  93. 7 ways to work around security compliance problems
  94. Satellite links for remote networks may pose soft target for attackers
  95. US House to target HealthCare.gov in two votes this week
  96. California lawmakers move to bar state help to NSA
  97. OpenSUSE forums hack raises vBulletin zero-day exploit possibility
  98. The NSA blame game: Singling out RSA diverts attention from others
  99. Time to examine rules on data collection and privacy, US commerce secretary says
  100. Nvidia takes customer site offline after SAP bug found
  101. The 7 best habits of effective security pros
  102. French fine Google over change in privacy policy
  103. EU politicians doubt that fighting terrorism is only reason for U.S. surveillance
  104. CIOs Must Balance Cloud Security and Customer Service
  105. Europe faces data protection vacancy
  106. World of Warcraft attack highlights two-factor authentication weakness
  107. Default settings leave external hard drives connected to Asus routers wide open
  108. The Internet of Things: Top five threats to IoT devices
  109. Senior managers fumble security much more often than rank and file
  110. Australian police investigating teen who found database flaw
  111. Yahoo malvertising attack linked to larger malware scheme
  112. Snapchat says sorry for the hack, with a tweak to its app
  113. Security analysis of mobile banking apps reveals significant weaknesses
  114. India's poll panel declines Google voting services offer over security concerns
  115. Senior managers fumble security much more often than rank and file
  116. OpenSUSE forums hack raises vBulletin zero-day exploit possibility
  117. The NSA blame game: Singling out RSA diverts attention from others
  118. Advocacy groups plan day of protest against NSA surveillance
  119. Breach goes from bad to worse for Target and its customers
  120. RSA boycott splits security industry on tactic's effectiveness
  121. Target: Up to 70 million affected by data breach
  122. Target: Up to 110 million affected by data breach
  123. Intel to scrap McAfee name, give away mobile security tools
  124. Neiman Marcus notifying customers after card data breach
  125. Target point-of-sale terminals were infected with malware
  126. How to securely get started using SDN
  127. Asus simplifies router configuration to protect external hard drives
  128. Rising impact of Target breach indicates deeper hack into systems
  129. Syrian Electronic Army shanghais Microsoft's Twitter account, blog
  130. How to rescue your PC from ransomware
  131. Cisco promises to fix admin backdoor in some routers
  132. Dropbox hit by outage on Friday, denies that it was hacked
  133. New Blackphone promises secure communications and privacy
  134. Google appeals €150,000 fine from French privacy watchdog over new policies
  135. Franken presses Ford on location data collection practices
  136. Technology of the Year 2014: The best hardware, software, and cloud services
  137. US judges say FISA court privacy advocate may be counterproductive
  138. Spammers target Google hospitality listings
  139. Senators question recommended changes to NSA surveillance
  140. Patch Tuesday: Fairly quiet on the Microsoft front
  141. 10 Cloud Security Startups to Watch in 2014
  142. SD cards are hackable, but probably not on a mass scale
  143. A year after Swartz suicide, reform of anti-hacking law remains elusive
  144. Security startup Impermium joining Google
  145. PCI DSS 3.0 is an evolution, not a revolution
  146. How to Bring Shadow IT Under Control
  147. NSA hacking tools will find their way to criminals eventually
  148. Cisco fixes remote access vulnerabilities in Cisco Secure Access Control System
  149. New Fujitsu Labs tech can do batch searches of encrypted data
  150. Snapchat, Bitly and Kik Messenger targeted by spammers
  151. Encrypted messaging startup Wickr offers $100K bug bounty
  152. Spy agencies around the world use radio signals to tap data from targeted systems
  153. Neiman Marcus says SSNs, birth dates not taken in breach
  154. Target credit card data was sent to server in Russia
  155. Hackathon geared toward the 'liberation' of data from public PDF documents
  156. HealthCare.gov still has major security problems, experts say
  157. Six more US retailers hit by Target-like hacks, security firm says
  158. Obama's NSA surveillance reforms get mixed reviews
  159. Obama's NSA proposals underscore reform challenges
  160. Obama fails to address NSA encryption-defeating methods, backdoors
  161. Obama's surveillance reform speech invokes history for context
  162. Obama's NSA reform proposals spark disappointment from some
  163. Obama proposes changes to NSA surveillance
  164. Starbucks releases iOS app update in response to security reports
  165. Researchers find new PoS malware written in VBScript
  166. Security risk in Starbucks app a 'wakeup call' for consumers
  167. Microsoft will furnish malware assassin to XP users until mid-2015
  168. Hit Google where it hurts to enforce data protection, urges EU Commissioner
  169. Spammers buy Chrome extensions and turn them into adware
  170. Google Glass user questioned in Ohio theater for suspected piracy
  171. Target-like attack unlikely against small retailers
  172. Target-related malware was a side job for man living in Russia
  173. Level 3, 11 other companies settle FTC privacy complaint
  174. Syrian Electronic Army hacks Microsoft's Office Blogs site
  175. The 8 most significant ways physical security has evolved
  176. 7 More Things NSA Could Be Watching, According to Security Experts
  177. 16 million online accounts probably compromised, German government warns
  178. Mysterious networking error stifles Internet access in China
  179. Location-based services: Controversy at every level
  180. Verizon: US gov't made 320,000 requests for customer info in '13
  181. The processes and tools behind a true APT campaign: Weaponization and delivery
  182. Google dismisses eavesdropping threat in Chrome feature
  183. Engineer nets Facebook's biggest bug bounty, but not the jackpot he hoped for
  184. Consumer Watchdog files Google+ complaint with FTC
  185. Some Tor exit nodes attempt to spy on encrypted traffic, researchers find
  186. China blames Internet outage on hacking attack
  187. Why I did it: Former hacker Mitchell Frost explains his motivation
  188. Snapchat's new image-based human verification system already defeated
  189. Perspective: Payment system security needs less talk, more action
  190. Hacker groups embracing more effective tactics in targeted attacks
  191. US federal watchdog calls for end to NSA phone records program
  192. Chrome exploit can secretly listen to oblivious users
  193. CNN's Twitter and Facebook accounts hacked
  194. Neiman Marcus says 'complex' malware defeated its security
  195. US privacy watchdog: NSA phone records program is illegal
  196. Why smart users are the key to secure online banking
  197. New Windows malware tries to infect Android devices connected to PCs
  198. Obama in awkward spot after privacy board calls NSA snooping illegal
  199. Google lays $2.7M on the line for Pwnium hacking contest
  200. Authentication bypass bug exposes Foscam webcams to unauthorized access
  201. Punish careless employees to reduce security breaches, vendor says
  202. After Target, Neiman Marcus breaches, does PCI compliance mean anything?
  203. FTC takes action against alleged Obamacare spammer
  204. Would NFC smartphones have helped at Target?
  205. Romanian authorities arrest man suspected of being celebrity hacker Guccifer
  206. Arts and crafts chain Michaels investigates possible data breach
  207. Microsoft says law enforcement documents likely stolen by hackers
  208. Prominent cryptography and security researchers deplore NSA's surveillance activities
  209. The processes and tools behind a true APT campaign: Command & Control
  210. Danger looms at the 2014 Winter Olympic Games in Sochi, but is Russia's security up t
  211. Attacks similar to Target breach could stall adoption of emerging tech
  212. Confusion over EU data protection watchdog resolved
  213. Suspected email hackers for hire charged in four countries
  214. VPN bypass vulnerability affects Android Jelly Bean and KitKat, researchers say
  215. The Open Source Rookies of the Year Awards
  216. Coca-Cola suffers data breach after employee 'borrows' 55 laptops
  217. Snapchat falters on security again, experts say
  218. Revised rules let Apple update law enforcement, national security data
  219. Retailer data breach trend not likely to end soon
  220. German government faces legal action over NSA spying
  221. FileZilla warns of large malware campaign
  222. NSA phone records program aids investigations, defenders say
  223. Lavabit case highlights legal fuzziness around encryption rules
  224. Russian man pleads guilty in SpyEye malware case
  225. New DOJ rules do not solve privacy issues in government data grab
  226. Hackers deface Angry Birds website following NSA spying claims
  227. iOS vs. Android: Which is more secure?
  228. Obama should have talked about NSA in address, say trade groups
  229. NSA gets its first civil liberties and privacy officer
  230. The top 5 security threats to watch for in 2014
  231. GoDaddy owns up to role in Twitter account hijacking incident
  232. Criminals use Java to infect Linux and Mac users with DDoS bot
  233. Target says attackers stole vendor credentials
  234. VPN flaw reported in latest version of Android
  235. DOJ's Holder says agency is investigating Target data breach
  236. Defendant challenges DOJ's use of NSA surveillance
  237. Misuse of proprietary data alone doesn't violate CFAA, judge rules
  238. Senator pushes for an end to NSA phone records program
  239. Obama selects cryptologist to head US NSA
  240. Researchers create Android app to show when other apps track you
  241. Yahoo resets passwords after Mail attack
  242. Positioning your institution's response in the face of data breach
  243. Tor-enabled malware stole credit card data from PoS systems at dozens of retailers
  244. The moral of the Twitter-GoDaddy breach: People are the easiest thing to hack
  245. Target credential theft highlights third-party vendor risk
  246. Symantec's results show firm battling changing security market
  247. Survey says more attention being paid to data privacy, but still a ways to go
  248. NIST's finalized cybersecurity framework receives mixed reviews
  249. FTC: Medical transcription firm allowed histories to be on search engine
  250. Mobile users at risk from lack of HTTPS use by mobile ad libraries, security research