List of articles - Úvod  Seznam   

 

Analysis  Android  Apple  APT  Attack  BigBrothers  BotNet  Congress  Crime  Cryptocurrency  Cyber  CyberCrime  CyberSpy  CyberWar  Exploit  Forensics  Hacking  ICS  Incindent  iOS  IT  IoT  Crypto  Mobil  OS  Phishing  Privacy  Ransomware  Safety  Security  Social  Spam  Vulnerebility  Virus

Datum

Název

Kategorie

 

(IN)SECURE Magazine

Magazine

 

 Phishing campaign leveraging on Dropbox targets Hong Kong media

Phishing

 

 The US military is still sending un-encrypted emails

Kryptografie

17.9.2015

​SYNful Knock: Backdoor Malware Found in Cisco Routers

Virus

10.8.2015

"Certifi-Gate" Android Vulnerability Lets Hackers Take Complete Control of Your Device

Android

8.5.2017

"Fatboy" Ransomware-as-a-Service Sets Ransom Based on Victim Location 

Ransomware

2.5.2017

"Malware Hunter" Helps Researchers Find C&C Servers 

Virus

9.5.2017

#MacronLeaks metadata suggests Russian threat actors behind Macron’s hack

 
 

#opKKK Anonymous denied involvement in recent leak

Hacking

 

#OpNimr Anonymous targets Saudi websites to stop al-Nimr’s crucifixion

Security

 

#ParisAttacks — Anonymous declares War on ISIS: 'We will Hunt you Down!'

ISIS

 

$103,000 stolen in Brain Wallets cracking attacks

Security

 

$17 smartwatch includes a backdoor in the pairing app

Security

 

(IN)SECURE Magazine issue 46 released

Magazine

 

(IN)SECURE Magazine issue 47 released

Magazine

 

(IN)SECURE Magazine issue 48 released

Magazine

 

.onion officially registered as special-use domain name by the IETF

 
 

@FFD8FFDB Twitter bot spies on poorly configured cameras

Social site

 

‘In Our Sites’ Operation seized 999 websites offering counterfeit goods

Hacking

 

‘Prohibition Era’ Of Security Research May Be Ahead

 
 

‘Software Liability Is Inevitable’

 
 

0-days found in widely used Belkin router, fixes still unavailable

 
 

0xHACKED: Brown University Accounts Distributing Phishing Emails

Security

 

1 in 4 organizations have experienced an APT

 
 

10 tips to help organizations stay secure this holiday season

 
 

10% of enterprises have at least one compromised device

 
 

100,000 laptops and phones left in UK bars each year

 

10.9.2015

11 Million Ashley Madison Passwords Cracked In Just 10 Days 

Hacking

 

11 zero-days uncovered in Samsung Galaxy S6 Edge

 
 

13 million MacKeeper users exposed in data breach

 
 

13 Million MacKeeper Users Hacked — 21 GB of Data Exposed

Hacking

 

130 Celebrities' Email Accounts Hacked; Hacker Stole Movie Scripts and Sex Tapes

REPORTS

 

137 major incidents disrupted EU telephony and Internet access in 2014

 
 

15-year-old Boy Arrested in connection with TalkTalk Cyber Attack

Hacking

 

15-Year-Old has been identified and arrested for TalkTalk Attack

Hacking

 

15-year-old Teenage Hacker Arrested Over FBI Computer Hack

Hacking

 

18,000 Android Apps include SMS stealing Library

Android

 

191 Million US Voters' Personal Info Exposed by Misconfigured Database

Security

 

19-Year-Old Teen Steals $150,000 by Hacking into Airline's Website

Crime

 

1-Click Way to Check If your Android Device is Vulnerable to Hacking

Android

 

200 Million WhatsApp Users Vulnerable to vCard Vulnerability 

Vulnerebility

9.9.2015

200 Million WhatsApp Users Vulnerable to vCard Vulnerability 

Vulnerebility

 

200,000 Comcast login credentials available on the Dark Web

Security

 

2015 Cost of Cyber Crime Study

 
 

2015 saw 888 data breaches, 246 million records compromised worldwide

 
 

250+ iOS apps offered on Apple's App Store found slurping user data

 
 

26 vulnerabilities found in parental monitoring application

 
 

26-Year-Old Hacker Sentenced to Record 334 Years in Prison

Hacking

 

27% of all detected malware appeared in 2015

Virus

 

3 OEMs Vulnerable To 3 Vulnerabilities. Your PCs At Risk

Vulnerebility

 

33 percent of all HTTPS websites open to DROWN attack

Computer attack

 

3G/4G cellural USB modems are full of critical security flaws, many 0-days

 
 

3G/4G modems continue to be vulnerable

Vulnerebility

 

3-in-1 solution for enterprise management of privileged accounts and info

 
 

4 in 10 midsize businesses have experienced a data breach

 
 

40% of companies expect a data breach next year

 
 

49 new Regin backdoor modules discovered

 
 

49 suspected members of cybercriminal group arrested in Europe

 
 

5 Guidelines in Battling Cyber Criminals Over Precious Business Data

Crime

 

5 reasons Security Congress is the (ISC)2 member event of the year

 
 

5.6 Million Federal Employees' Fingerprints Stolen in OPM Hack

Crime

 

5.6 Million Fingerprints Stolen In OPM Hack

 
 

500 million users at risk of compromise via unpatched WinRAR bug

 
 

6.4 billion connected things will be in use in 2016

 
 

600TB of data exposed due to misconfigured MongoDB instances

 
 

602 Gbps! This May Have Been the Largest DDoS Attack in History

Computer attack

 

63% in favor of encryption backdoors to respond to national security threats

 
 

65,000+ Land Rovers recalled due to software bug

 
 

7 key global DDoS trends revealed

 
 

7 years of Android: A painful journey to world dominance

Android

 

70% of breaches are detected by a third-party

 
 

74% organizations think they will be hit by an APT in the near future

Security

 

75% of companies experienced a fraud incident in the past year

 
 

8 key online fraud behaviors and patterns

 
 

81% of healthcare organizations have been compromised

 
 

86% of PHP-based apps contain at least one XSS vulnerability

 
 

86.2 million phone scam calls delivered each month in the U.S.

 
 

87% of Android smartphones are insecure and that’s no joke

Android

 

88 percent of company networks vulnerable to privileged account hacks

REPORTS

 

88% of Android devices vulnerable due to slow patch management

Android

 

90% of companies benefit from Big Data

 
 

90% of directors believe regulators should hold firms liable for hacks

 
 

90% of large businesses in the UK experienced data breach

Security

 

9271 crucial vulnerabilities found in 185 firmware images of embedded devices

 
 

95% of websites in 10 new TLDs are suspicious

 
 

A billion Android devices vulnerable to Stagefright 2.0 bugs

Android

 

A critical RCE flaw in Intel Management Engine affects Intel enterprise PCs dates back 9 years

 
 

A day attack with DDoS booter cost $60 and can cause $720k in damage

Computer attack

 

A DHS report confirms the use of BlackEnergy in the Ukrainian outage, still unknown its role

Hacking

 

A few hours the Paris attacks, a new ISIS propaganda hub appeared on the Darknet

ISIS

 

A flaw in CISCO Universal Small Cell allows firmware retrieval

Vulnerebility

 

A flaw in D-Link Switches opens corporate networks to hack

Vulnerebility

 

A flaw in TeslaCrypt ransomware allows file recovering

Virus

 

A FOP data dump leaked online, 2.5GB of police contracts and data

Security

 

A Fourth Teenager was arrested over TalkTalk data breach

Hacking

 

A fundamental shift in security spending

 
 

A Jihadi Help Desk assists ISIS terrorists and sympathizers with encryption?

 
 

A journalist has been hacked on a plane while writing an Apple-FBI story

Apple

 

A look at North Korea’s ‘paranoid’ Red Star OS computer operating system

OS

 

A new Drydex campaign targeted British businesses

Virus

 

A new emergency patch for Adobe Flash Zero-Day, update your system!

Vulnerebility

 

A new person is leaking confidential documents on the US drone wars

Security

 

A new wave of attacks linked to the Codoso ATP Group

Computer attack

 

A new, streamlined version of Cryptowall is doing rounds

 
 

A replica of AlphaBay market used to steal login credentials

Security

 

A research team has found two flaws in the OAuth 2.0 protocol

Vulnerebility

 

A secret cellphone spying devices catalog leaked online

Hardware

 

A serious issue in Steam allowed access to other users’ accounts

Hacking

 

A severe flaw in OpenSSL allows hackers to decrypt HTTPS traffic

Hacking

 

A severe vulnerability affects eBay, be careful to phishing attacks

Computer attack

 

A slew of LTE 4G vulnerabilities endanger Android users and mobile carriers

 
 

A software bug caused the early release of 3,200 US prisoners

Vulnerebility

 

A sophisticated variant of OceanLotus trojan targets OS X systems

Apple

 

A Step-by-Step Guide — How to Install Free SSL Certificate On Your Website

Security

 

A Turkish hacker scores a record jail sentence of 334 years

Hacking

 

A well-funded cyber criminal group targets Asian organizations

Hacking

 

A XSS may have exposed users of the eBay website to phishing attacks

Computer attack

 

A young hacker violated the CIA Director’s private AOL email

Hacking

 

Abysmal security practices by toy maker VTech result in massive data breach

 
 

Access Private Photos and Contacts Without a Passcode on iOS 9 devices

Apple

 

Account recovery via secret questions is a bad idea

 
 

Actor using Angler exploit kit switched to Neutrino

Hacking

 

AdBlock Extension has been Sold to an 'Unknown Buyer'

Technologies

 

Admedia attacks now rely also on Joomla to serve ransomware

Virus

 

Adobe fixes critical and important flaws in Flash Player and Experience Manager

 
 

Adobe fixes dozens critical vulnerabilities in Flash Player

Vulnerebility

 

Adobe Flash Update Includes Patches for 17 Vulnerabilities

 
 

Adobe Hotfix Patches XXE Vulnerability in ColdFusion

 
 

Adobe Patches 23 Critical Vulnerabilities in Flash Player 

 
 

Adobe Patches 69 Vulnerabilities in Reader, Acrobat, Flash 

 
 

Adobe Patches Flaws in Flash Player, Experience Manager 

 
 

Adobe patches Hacking Team Flash zero-days, update immediately!

 
 

Adobe Patches Two Shockwave Player Vulnerabilities

 
 

Adobe Patches XXE Vulnerability in LiveCycle Data Services

 
 

Adobe Releases 23 Security Updates for Flash Player

Vulnerebility

 

Adobe to Kill 'FLASH', but by Just Renaming it as 'Adobe Animate CC'

Security

 

Adobe to Patch Reader and Acrobat Next Week

 
 

AdobeWorkgroupHelper 2.8.3.3 - Stack Based Buffer Overflow 

 
 

Advantech Clears Hard-Coded SSH Keys from EKI Switches

 
 

Adware installer gives itself permission to access Mac users' keychain

 
 

Aerospace Probes released to stratosphere for spying weapons

Technologies

 

Aethra botnet made up of 12000 Italian devices threatens businesses

Security

 

After two fixes, OAuth standard deemed secure

 
 

Aggressive Android ransomware spreading in the USA

Android

 

Aggressive tactics from DD4BC extortionist group revealed

 
 

AirDrop Bug in Apple iOS and OSX allows Hackers to Install Malware Silently

Apple

 

Akamai and Trustwave unite to protect businesses from online threats

 
 

ALERT: This New Ransomware Steals Passwords Before Encrypting Files

Virus

 

AlienSpy RAT Resurfaces as JSocket

 
 

AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1

Hardware

 

All BBC Websites went down after a major DDoS attack

Hacking

 

All Versions of Windows affected by Critical Security Vulnerability

Vulnerebility

 

Alleged LulzSec member claims responsibility for the DDoS on TalkTalk

Hacking

 

Allegedly 40 apps on App Store are infected

Apple

 

Amaq, the new ISIS Android App for secure communications

ISIS

 

Amazon Inspector Addresses Compliance and Security Challenge

 
 

Amazon launches AWS web application firewall

 
 

Amazon resets customers' potentially compromised passwords 

 
 

Amazon used as bait

Security

 

America’s Thrift Stores breached by Eastern European criminals

 
 

An Amazon employee became owner of Google.com for a few minutes

Technologies

 

An Army of Thousands of Hacked Servers Found Mining Cryptocurrencies

 
 

Analytics services are tracking users via Chrome extensions

 
 

Analyzing Ransom32, the first JavaScript ransomware variant

Virus

 

Anarchist operation, US and UK spied on Israeli UAVs and fighter jets

Cyber Attack

 

and the most sophisticated Android malware ever exposed

 
 

Android 5 bug allows attackers to easily unlock password-protected devices

 
 

Android adware tricks users into giving it power to secretly download other apps

 
 

Android banking malware SlemBunk continues to evolve

Android

 

Android factory reset not enough to keep data secure

 
 

Android ransomware gets new, professional look thanks to Google’s Material Design

Android

 

Android ransomware masquerades as Adult Player app, takes photo of victim

Android

 

Android smartphones

 
 

Android Stagefright Exploit Code Released

Android

 

Android Stagefright Exploit Code Released to Public 

 
 

Android Tablets with Pre-loaded Cloudsota malware sold on Amazon

Android

 

Android users rejoice! Security updates will be coming out faster

 
 

Android’s Vampire Bat Apps are listening to your life through ultrasonic beacons

 
 

Angler EK exploits recently patched IE bug to deliver ransomware

Virus

 

Angler exploit kit includes the code of a recent Flash flaw

Security

 

Anonymous Declares War On Donald Trump — #OpTrump

Cyber Attack

 

Anonymous goes after ISIS, aims to expose recruiters and sympathizers

 
 

Anonymous Group Leaks Identities of 1000 KKK Members

Security

 

Anonymous hacked the France’s Ministry of Defense portal CIMD (Centre d’Identification des Materiels de la Defense)

Hacking

 

Anonymous Hackers to Leak 1000 of KKK Members Details on Million Mask March (Nov 5, 2015)

Hacking

 

Anonymous Hacking Group Takes Down 20,000 ISIS Twitter accounts

ISIS

 

Anonymous has taken down 5,500 ISIS accounts

ISIS

 

Anonymous leaked 18GB of data belonging to the Turkish national police

Hacking

 

Anonymous Took Down 20,000 pro-ISIS Twitter accounts

ISIS

 

Anonymous took down several government websites of Saudi Arabia

Hacking

 

Anonymous will reveal names of about 1,000 KKK members

Hacking

 

Another computer system at the Pentagon has been hacked

Hacking

 

Another ISIS Hacker Killed by U.S Drone Strike in Syria

ISIS

 

Another Magento Remote Code Execution Vulnerability

Vulnerebility

 

Another root CA cert with key found on Dell's machines

 
 

Another teenager arrested in connection to TalkTalk hack

 
 

Anti-IS group ‘New World Hackers’ claims BBC website attack

ISIS

 

Antiquated environment and bad security practices aided OPM hackers

 
 

API security becoming a CXO level concern

 
 

Appeals Court Vacates Lower Court’s Decision on National Security Letters

 
 

Apple Addresses Dozens of Vulnerabilities, Embraces Two-Factor Authentication in iOS 9 

Apple

 

Apple App Store suffers its first large-scale attack

Apple

 

Apple Boosts iOS 9 Security with improved Two-Factor Authentication

Apple

 

Apple boots some ad blockers from App Store to protect users' privacy

Apple

 

Apple can access your encrypted iMessages

Apple

 

Apple Can Still Read Your End-to-End Encrypted iMessages

Apple

 

Apple complicates app sideloading in iOS 9 for increased security

Apple

 

Apple confirms Judge unlock a new iPhone is not possible

Apple

 

Apple Could Offer iMessage App for Android

Apple

 

Apple fixes a bucketload of vulnerabilities in everything

Apple

 

Apple fixes serious flaws in the Productivity Apps

Apple

 

Apple Gatekeeper Bypass Opens Door for Malicious Code 

Apple

 

Apple Goes All-In on Privacy

Apple

 

Apple has several apps from the official iOS App Store

Apple

 

Apple hires developer of World's Most Secure Messaging App

Apple

 

Apple iOS 9.0.2 Update Patches Lock Screen Bypass Exploit

Apple

 

Apple iOS Jailbreak Tweaks Have Backdoors; 220,000 iCloud Accounts Hacked

Apple

 

Apple is working on New iPhone Even It Can't Hack

Apple

 

Apple Kicks Out some Malicious Ad-Blocker Apps from its Online Store

Apple

 

Apple Mac OS X Hits by Two Unpatched Zero-day Flaws

Apple

 

Apple Patches 100+ Vulnerabilities in OS X, Safari, iOS 

Apple

 

Apple Patches Critical OS X DYLD Flaw in Monster Update

Apple

 

Apple patches serious remotely exploitable iTunes and App Store flaw

Apple

 

Apple pushes out critical security updates for OS X, iOS, watchOS, and other products

Apple

 

Apple releases OS X El Capitan, patches passcode loophole in iOS

Apple

 

Apple releases security updates for every major product

Apple

 

Apple Removes Apps That Expose Encrypted Traffic

Apple

 

Apple removes hundreds of malicious apps after major malware attack

Apple

 

Apple to Built Fuel Cell Battery that Could Power iPhones and Macbooks for Weeks

Apple

 

Apple to Remove 256 iOS Apps Using Private APIs, Collecting Personal Data 

Apple

 

Apple told Judge: It's Impossible to Access Data on Locked iPhones

Apple

 

Apple vs. FBI — Google Joins Tim Cook in Encryption Backdoor Battle

Apple

 

Apple watchOS2 Includes Host of Code-Execution Patches

Apple

 

Apple Zero Day Remains Unpatched

Apple

 

Apple's Biggest Hack Ever: 4000 Malicious iOS Store Apps Linked to CIA?

Apple

 

Apple's Mac OS X Still Open to Malware, Thanks Gatekeeper

Apple

 

Apple's Swift programming language is now open source

Apple

 

Approximate machine improves the Bitcoin mining by 30 percent

Technologies

 

APT Group Gets Selective About Data it Steals

APT

 

APT Groups don’t go under the grid after a successful attack!

APT

 

APT Trends report, Q1 2017

APT

 

APT-style bank robberies increase with Metel, GCMAN and Carbanak 2.0 attacks

APT

 

Arabian tales by ‘Nigerians’

Security

 

Are IT pros overconfident in their ability to deflect attacks?

 
 

Are IT security pros optimistic or naïve?

 
 

Are Russian hackers infecting critical infrastructure in Ukraine?

Cyber Attack

 

Are we putting our finances at risk with our online shopping and banking?

Security

 

Are you ready for EMV?

 
 

Are you searching for a Facebook Hacking Tool? Be careful!

Social site

 

Are your competitors organizing DDoS attacks against you?

 
 

Ashley Madison hacked, info of 37 million users stolen

 
 

Ashley Madison Hacker – An Insider Woman Employee?

Hacking

 

Ashley Madison-themed blackmail, data deletion scams hitting inboxes

 
 

Assassins in the darkweb, “Service catalogue” and Price list” updated

Hacking

 

Asus Faces 20 years of Audits Over Poor Wi-Fi Router Security

Hardware

 

Asus Patches Vulnerabilities in RT Routers 

Vulnerebility

 

AT&T Facilitated NSA Surveillance Efforts, Reports

NSA

 

ATMZombie: banking trojan in Israeli waters

Virus

 

ATP group uses Word Docs to drop BlackEnergy Malware

Virus

 

Attack code for critical Android Stagefright flaw published

 
 

Attack on Zygote: a new twist in the evolution of mobile threats

Mobil

 

Attacker Compromised Mozilla Bug System, Stole Private Vulnerability Data 

 
 

Attackers actively exploiting Windows bug via malicious USB devices

 
 

Attackers Can Use SAP to Bridge Corporate, Operational ICS Networks 

 
 

Attackers can use Siri, Google Now to secretly take over smartphones

 
 

Attackers compromise Cisco Web VPNs to steal login credentials, backdoor target networks

 
 

Attackers Embracing Steganography to Hide Communication 

 
 

Attackers hack into Outlook Web App (OWA) Server for access to organization network

Computer attack

 

Attackers posing as legitimate insiders still an enormous security risk

 
 

Attackers prefer lower-bandwidth DDoS attacks

 
 

Attackers Replacing Firmware on Cisco Routers

 
 

Attackers take over org's OWA server, harvest domain credentials with malicious DLL

 
 

Attackers use Google Drive, Dropbox to breach companies

 
 

Attacking Diffie-Hellman protocol implementation in the Angler Exploit Kit

Exploit

 

Audit shows Department of Homeland Security 6 billion U.S. Dollar firewall not so effective against hackers

Security

 

Australian NSW Government Department of Resources and Energy under attack. Is it Chinese cyber espionage?

Security

 

Authentication bypass flaw in Netgear SOHO routers exploited in the wild

 
 

Author of the Angler EK integrated recently Silverlight exploit

Virus

 

Authorities Take Down Darknet Marketplace 

 
 

Authors digitally signed Spymel Trojan to evade detection

Virus

 

AutoIt Used in Targeted Attacks to Move RATs

Virus

30.8.2015

Automating Metrics using RTIR REST API

 
 

AVG Antivirus Plans to Collect & Sell Your Personal Data to Advertisers

Security

 

AVG will sell user browsing and search info to advertisers

 
 

AVG, McAfee, and Kaspersky antivirus were vulnerable to critical flaw

Vulnerebility

 

AV-Test – Which is the best Antivirus for Linux systems?

Virus

 

AV-TEST 2015 AWARDs – Which is the best antivirus solutions?

Security

 

Back to the Future: How much of Marty and Docs' tech is a reality?

 
 

Backdoor In A Backdoor Identified in 600,000 Arris Modems

 
 

Backdoor in Baidu Android SDK Puts 100 Million Devices at Risk

Android

 

BackStab Malware steals iOS and BlackBerry Backups

Virus

 

Bad actors target entities worldwide via Cisco WebVPN

Hacking

 

Bad Santa! Microsoft Offers — 'Upgrade now' or 'Upgrade tonight' to Push Windows 10

Security

 

BadBarcode: Poisoned barcodes can be used to take over systems

 
 

Banking Malware Moving Over Facebook Hosted in Cloud

 
 

Bartalex Variants Spotted Dropping Pony, Dyre Malware

 
 

Be careful Facebook users, you are under attack!

Computer attack

 

Be careful, opening crashsafari.com your mobile will crash

Apple

 

Beaches, carnivals and cybercrime: a look inside the Brazilian underground

Crime

 

Behind the scenes at BruCON, a European hacker conference

 
 

Belkin's N150 router sports multiple flaws, including default access credentials for telnet server

 
 

Beware Coffee Lovers! StarBucks Exposed you to 3 Critical Vulnerabilities

Vulnerebility

 

Beware fake LinkedIn profiles, threat actors are using them to hack you

Social site

 

Beware of Apple-themed phishing emails threatening to limit your account

 
 

Beware of Backdoored Linux Mint ISOs

Hacking

 

Beware! Don't Fall for FireFox "HoeflerText Font Wasn't Found" Banking Malware Scam

 
 

Beware, connected ikettles can leak WiFi passwords

Security

 

Big Data investments on the rise

 
 

Bitcoin Core Developers Quit Bitcoin Project to Launch a New Digital Currency

Security

 

Bitcoin Creator 'Satoshi Nakamoto' Unmasked! An Australian Man 'Craig Wright' identified...

Technologies

 

Bitcoin Extortionist Copycats on the Rise, Experts Say 

 
 

Bitglass granted patent on searchable cloud encryption

 
 

BitKangoroo Ransomware Deletes User Files 

Ransomware

 

BitTorrent clients can be made to participate in high-volume DoS attacks

 
 

BitTorrent Fixes Reflective DDoS Attack Security Flaw

Computer attack

 

Black Friday and Cyber Monday, Keep Yourself Safe

Hacking

 

Black marketplace – 50c buys login for stolen media accounts

Hacking

 

BlackEnergy APT Attacks in Ukraine employ spearphishing with Word documents

Security

 

BlackEnergy infected also Ukrainian Mining and Railway Systems

Virus

 

BlackEnergy targets Ukrainian news media and electric industry

Virus

 

Blackhole Exploit Kit Resurfaces in the wild

Hacking

 

Blackmoon Banking Trojan Continues to Target South Korea 

 
 

BLEKey Device Breaks RFID Physical Access Controls

 
 

Blockchain transactions create risks for financial services

 
 

Bogus PayPal App used to spread a banking Trojan

Virus

 

Botnet of Thousands of Servers Mines for Crypto-Currency 

 
 

Brain's reaction to certain words could replace passwords

 
 

Breaches might be inevitable, but penalties are not harsh enough

 
 

Breaking — India Bans Facebook's Free Basics Service

Social site

 

British Gas customers’ data posted online, 2,200 records exposed

Hacking

 

British Intelligence Agency Can Hack Any Smartphone With Just a Text Message

Hacking

 

British Intelligence Open-Sources its Large-Scale Graph Database Software

NSA

 

British NCA revealed to have hacking abilities, aka equipment interference

Hacking

 

British-born ISIS Hacker Killed in US Drone Strike in Syria

ISIS

 

Brute-Force amplification attacks on WordPress rely on XML-RPC

Computer attack

 

Bug hunting without much tech knowledge or many tools

 
 

Bug in Android Gmail app allows effective email spoofing

 
 

Bug in Gmail app for Android Allows anyone to Send Spoofed Emails

Vulnerebility

 

Bug in OS X Yosemite allows attackers to gain root access

 
 

Bugs in Drupal's update process could lead to backdoored updates, site compromise

 
 

Bugzilla CVE-2015-4499 flaw, be aware hackers could know all your bugs

Vulnerebility

 

Business email compromise (BEC), the 5 billion dollar scam

 
 

Business email compromise scams still happening, still successful

 
 

Business leaders increasingly drive cloud migration

 
 

Businesses know about POS security risks, but are they investing wisely?

 
 

Businesses Using Millions of insecure SHA-1 Certificates

Security

 

Bye bye, Flash! Google to Ban Flash-based Advertising

Security

 

Bypass Developed for Microsoft Memory Protection, Control Flow Guard

 
 

Cadelle and Chafer, Iranian hackers are tracking dissidents and activists

Hacking

 

Can an inevitable evil be conquered?

Technologies

 

Can organizations hold back the tide of cloud adoption?

 
 

Can Scientists 'Upload Knowledge' Directly into your Brain to Teach New Skills?

Security

 

Canada – Military data found in hard drive at the recycling depot

Security

 

Canceled Talk Re-Ignites Controversy Over Legitimate Security Research 

 
 

Car Hacking Gets the Attention of Detroit and Washington

 
 

Car hacking via compromised car diagnostic tools

 
 

Carbanak gang is back and packing new guns

APT

 

Carbanak gang makes the headlines again, hackers refined intrusion tactics

 
 

Carbanak Hackers Refine Intrusion Tactics 

 
 

Carbanak Hackers Use Shims for Process Injection, Persistence 

 
 

Card Breach at Hilton Hotel Properties Under Investigation

Crime

 

Casino Sues Cyber Security Company Over Failure to Stop Hackers

Security

 

Caution! Hackers Can Easily Hijack Popular Baby Monitors to Watch Your Kids

Hacking

 

Caution, Hackers targeted the cPanel Database

Hacking

 

CDNetworks to showcase Cloud Security 2.0 at Black Hat USA 2015

 
 

Census Bureau Says Breach Didn’t Compromise Sensitive Data

 
 

CenterPOS – The evolution of POS malware

Virus

 

Central Shop, the evolution of credit card black markets

Security

 

CERT Warns of Hard-Coded Credentials in DSL SOHO Routers

Hardware

 

CERT Warns of Slew of Bugs in Belkin N600 Routers

 
 

CFOs are not confident about their level of security

 
 

CIOs agree, IT is more complex than ever

 
 

CISA Passes Senate, criticism about privacy and security

Security

 

Cisco finds, removes more default SSH keys on its software

 
 

Cisco fixes a critical flaw in CISCO CVR100W Wireless-N VPN Small Business Routers

 
 

Cisco fixes Command Injection vulnerability in CISCO ACE 4710 products

Vulnerebility

 

Cisco Fixes DoS Vulnerability in ASR 1000 Routers

 
 

Cisco Industrial switches affected by an unpatched flaw

Vulnerebility

 

Cisco Jabber flaw allows MitM attackers to wiretap communications

 
 

Cisco patched CVE-2017-3881 IOS XE Vulnerability leaked in CIA Vault 7 Dump

 
 

Cisco Patches CIA Zero-Day Affecting Hundreds of Switches 

 
 

Cisco Patches Critical Flaw in Small Business Router 

 
 

Cisco Patches Denial-of-Service, Bypass Vulnerabilities in IOS

Vulnerebility

 

Cisco Patches File Overwrite Bug in IMC Supervisor and UCS Director

 
 

Cisco released a tool to scan for SYNful_Knock implants

Security

 

Cisco squashes DoS bug in its unified infrastructure software

 
 

Cisco Systems will be auditing their code for backdoors

 
 

Cisco Takes Down Ransomware Operation Generating $30 Million in Revenue For Hackers

Virus

 

Cisco Warns Customers About Attacks Installing Malicious IOS Bootstrap Images

Virus

 

Cisco wireless points include hardcoded passwords

Hardware

 

CISO at U.S. Bank offers tips for secure online purchasing

 
 

CISOs are looking for more integration and automation

 
 

Citovat Wassenaar, HP vytáhne z Mobile Pwn2Own

 
 

Civil nuclear facilities worldwide at risk of cyber attack

Cyber Attack

 

Clash of Greed

 
 

Class Action Suit Against Neiman Marcus Over Data Breach Revived

 
 

Clever Android ransomware infects tens of thousands of devices

Ransomware

 

Clickjacking Campaign exploits the European Cookie Law

Security

 

Click-Malware Podvod Šíření přes JavaScript Přílohy

 
 

Cloud encryption and tokenization trends in financial services

 
 

Cloud-based solutions that protect against zero day attacks

 
 

Cloud-based vulnerability management: Top vendors in the field

 
 

Cloudflare Launches Service to Protect IoT Devices 

 
 

Cloud-Hosted Botnet Controllers on the Rise: Report 

 
 

Code Signing certificates becoming popular cybercrime commodity

Security

 

Coinvault, are we reaching the end of the nightmare?

Virus

 

Collision Attack: Widely Used SHA-1 Hash Algorithm Needs to Die Immediately

Computer attack

 

Comcast resets passwords for 200,000 users after login credentials go on sale

 
 

Commercial code is more compliant to security standards than open source code

 
 

Comodo Internet Security opened your PC to attackers

Security

 

Comodo Issues Eight Forbidden Certificates

 
 

Comodo's so-called 'Secure Internet Browser' Comes with Disabled Security Features

Vulnerebility

 

Companies investing in cloud, security and Big Data are growing faster

 
 

Companies leave vulnerabilities unpatched for up to 120 days

 
 

Companies still lack security controls for accessing enterprise applications

 
 

Complex security solutions are exposing companies to risk

 
 

Compliance vs. cybersecurity: Insurers face competing priorities

 
 

Compromising Macs with simple Gatekeeper bypass

 
 

Conexant audio driver works as Built-in Keylogger feature in dozens HP devices

 
 

Confidence in antivirus falls to all-time low

 
 

Confusion about IT security leaves devices at risk

 
 

Confusion regarding strategic defenses for network security

 
 

Consent Control and eDiscovery: Devils in GDPR Detail 

 
 

Consumers expect businesses to be more transparent on how their data is used

 
 

Consumers increasingly adopting personal security measures

 
 

Container security concerns escalate

 
 

Cops are turning to privately held DNA databases for info to help with investigations

 
 

Core Infrastructure Initiative Launches Open Source Security Badge Program

Open source

15.9.2015

CoreBot Adds New Capabilities, Transitions to Banking Trojan 

Virus

 

CoreBot Malware Steals Credentials-For Now

 
 

Corporate networks can be compromised via Windows Updates

 
 

Cost of Breaking SHA-1 decreases due to a new Collision Attack

Computer attack

 

Cox Communications to pay $595,000 for data breach

 
 

Cracka hackers doxed more than 2,000 Government employees

Hacking

 

Cracka hackers who doxed CIA Chief, not hit the FBI Deputy Director

Hacking

 

Cracking WiFi Passwords By Hacking into Smart Kettles

Hacking

 

Cracks in the mobile ecosystem, Internet-connected devices

 
 

Creator of MegalodonHTTP DDoS Botnet Arrested

Security

 

Credential manager system used by Cisco, IBM, F5 has been breached

 
 

Criminals behind CryptoWall 3.0 Made $325 Million

Virus

 

Criminals hacked chip-and-PIN system by perfecting researchers' PoC attack

 
 

Criminals, Linguistics, Literacy and Attribution

Crime

 

Critical Bugzilla flaw allows access to unpatched vulnerability information

 
 

Critical Flaw Patched in Jenkins Automation Server 

 
 

Critical Flaws Found in NETGEAR Network Management System

Vulnerebility

 

Critical Flaws Found in Network Management Systems

 
 

Critical Flaws in Magento leave Millions of E-Commerce Sites at Risk

Vulnerebility

 

Critical glibc Flaw Puts Linux Machines and Apps at Risk (Patch Immediately)

Vulnerebility

 

Critical Java Bug Extends to Oracle, IBM Middleware

 
 

Critical Joomla RCE bug actively exploited, patch immediately!

 
 

Critical Netgear Router Exploit allows anyone to Hack You Remotely

Vulnerebility

 

Critical OpenSSH Flaw Leaks Private Crypto Keys to Hackers

Vulnerebility

 

Critical OpenSSL Flaw Allows Hackers to Decrypt HTTPS Traffic

Vulnerebility

 

Critical 'Port Fail' Vulnerability Reveals Real IP Addresses of VPN Users

Vulnerebility

 

Critical RCE bug in FireEye's security appliances exploitable via email

 
 

Critical RubyGems vulns can lead to installation of malicious apps

 
 

Critical ScreenOS bugs allow undetectable decryption of VPN connections, device hijacking

 
 

Critical vulnerabilities found in Honeywell Midas Gas Detectors

Vulnerebility

 

Critical Vulnerabilities in 3G/4G Modems or how to build Big Brother

Vulnerebility

 

Crooks are abusing Google Search Console to remain under the radar

Technologies

 

Crooks are offering Apple employees up to $23,000 for their login credentials

Apple

 

Crooks steal over $50 million from aircraft systems manufacturer FACC

Crime

 

Crooks stole €600,000 in MitM attacks on EMV Cards

Hacking

 

Crooks use the Nuclear Exploit Kit to serve CryptoWall 4.0

Virus

 

Cross-device tracking via imperceptible audio beacons threatens user privacy

 
 

Crypto e-mail provider ProtonMail pays ransom to stop DDoS attack, attack continues

 
 

Crypto-ransomware encrypts files "offline"

 
 

Cryptowall 4.0 comes from Russia, Bitdefender released a vaccine

Virus

 

CryptoWall 4.0 Released with a New Look and Several New Features

Virus

 

CryptoWall Ransomware raised $325 Million in Revenue for Its Developer

Virus

 

CSA releases tool for personal data legal protection

 
 

CSRF Flaw Patched in Popular Spring Social Core Library

 
 

CTB-Locker is back: the web server edition

Virus

 

CTB-Locker Ransomware Spreading Rapidly, Infects Thousands of Web Servers

Virus

 

CUJO: Plug-n-play protection for all devices

 
 

Curbing the For-Profit Cybercrime Food Chain

 
 

Custom Google App Engine Tweak Still Leads to Java Sandbox Escapes 

 
 

Custom secure apps are gaining popularity in the enterprise

 
 

Customers of Japanese banks targeted by the Brolux Trojan

Virus

 

CVE-2015-8562 – 16,000 Daily Attacks on vulnerable Joomla servers

Vulnerebility

 

CVE-2016-0603 – Oracle Issues out-of-box Java emergency patch for Windows

Vulnerebility

 

Cyber attack grounds Polish LOT aeroplanes

 
 

Cyber attack on US power grid could result in losses up to $1 trillion

 
 

Cyber attack overall cost suffered last year by businesses is $315b

Security

 

Cyber Caliphate Hacks 54k Twitter accounts, including ones of CIA and FBI officials

Hacking

 

Cyber crooks abuse legitimate EU Cookie Law notices in clever clickjacking campaign

 
 

Cyber crooks actively hijacking servers with unpatched vBulletin installations

 
 

Cyber crooks opt for APT method for delivering malware

 
 

Cyber defence is a profitable “Hamster Wheel”

Cyber Attack

 

Cyber insurance market to hit US$10 billion by 2020

 
 

Cyber liability insurance is becoming an increasing necessity

 
 

Cyber risk still poorly communicated to C-suite executives

 
 

Cyber security guidelines for the shipping industry

 
 

Cyber spies of the Sofacy APT increased its operations tenfold

Hacking

 

Cyber Terrorists Can Get Their Hands on UK Infrastructure, Like the Net or Electricity

Security

 

Cyber warfare fears spur US Navy to teach celestial navigation again

 
 

Cyberattacks will cost U.S. health systems $305 billion

 
 

Cybercriminals are becoming more creative

 
 

Cybercriminals are preying on existing vulnerabilities to plan future attacks

 
 

Cybercriminals increasingly hunting down the money

 
 

Cybercriminals to target new payment technologies

 
 

Cyberespionage group exploits satellites for ultimate anonymity

 
 

Cybersecurity expectations: Myth and reality

 
 

Cybersecurity is being taken seriously around the globe

 
 

Cybersecurity Operational Tests And Assessments – US Defence can’t check F-35 data due to insecure systems

Security

 

Cybersecurity strategies and the boardroom

 
 

CyberSpace — China arrested Hackers at U.S. Government Request

Cyber Attack

 

Cyberspace Global Warming as a duality of Trajectories on cyberpolitics

Cyber Attack

 

Cyberspies Use KONNI Malware to Target North Korea 

 
 

Czech Court to Rule This Month on Extradition of Russian Hacker 

 
 

Damballa revealed the secrets behind the Destover malware that infected the Sony Pictures

Virus

 

Darkhotel APT Latest to Use Hacking Team Zero Day

 
 

DarkHotel hackers are back targeting Chinese Telecom

Hacking

 

Darkhotel spying crew boosts attacks with Hacking Team exploit

 
 

Darkode forum returns with lousy security that keeps serious users away

 
 

Darkode forum was supposed to be resuscitated, but …

Security

 

Darkweb, a look back at 2015 events and 2016 predictions

Security

 

DARPA is working on ICARUS, the disappearing delivery drone

Technologies

 

DARPA Protecting Software From Reverse Engineering Through Obfuscation 

 
 

Data Breach Day — Patreon (2.3M), T-Mobile (15M) and Scottrade (4.6M) — HACKED!

Crime

 

Data breaches and bots are driving cybercrime surge

 
 

Data breaches, stolen data and their sale in the Dark Web

Crime

 

Data dump points to a breach at Electronic Arts

 
 

Data of 34,000 Steam users exposed due to buggy caching configuration

Security

 

Database of 70 million prisoner phone calls breached, leaked

 
 

Database with 191 Million US voters’ personal data exposed online

Hacking

 

Dating scam package offered in the underground

Security

 

DDoS attack on BBC may have reached 602Gbps, never so powerful

Computer attack

 

DDoS attacks increase 180% compared to a year ago

 
 

Deadly Simple Exploit Bypasses Apple Gatekeeper Security to Install Malicious Apps

Virus

 

Deadly Windows, Reader font bugs can lead to full system compromise

 
 

De-anonymizing code authors by analyzing executable binaries

 
 

Deep Web Search Engines to Explore the Hidden Internet

Security

 

Default Apache Configuration Can Unmask Tor Hidden Services

Security

 

Default conf on Apache Web servers can de-anonymize your hidden service

Security

 

Deleting WhatsApp Messages Before 90 Days Could Land you in Jail

Security

 

Dell puts users at risk with dangerous eDellRoot root certificate

Hacking

 

Dell shipped computers with root CA cert, private crypto key included

 
 

Dell's Laptops are Infected with 'Superfish-Like' pre-installed Malware

Virus

 

Demand for new malicious programs reaches saturation point

 
 

Dennis Fisher On Security, Journalism, and the Origins of Threatpost 

 
 

Deplorable Steam security flaw exploited to hijack prominent accounts

 
 

Design Flaws Make Drones Vulnerable to Cyber-Attacks

Computer attack

 

Details Surface on Patched Bugzilla Privilege Escalation Flaw 

 
 

Details Surface on Patched Sandbox Violation Vulnerability in iOS

Vulnerebility

 

DHS Funds Smartphone Authentication Projects 

 
 

DHS Information Security Program, Dozens secret databases vulnerable to hack

Security

 

DHS Raises Privacy Concerns With Senate Cyber Threat Sharing Bill

 
 

DHS working on ‘self-destructing’ security chip for smartphones

Hardware

 

DHS: Drug Traffickers are hacking surveillance drones on the border

Security

 

Did FBI pay the Carnegie Mellon to hack Tor?

Hacking

 

Did terrorists use PlayStation 4 for communications in Paris attacks?

ISIS

 

Digitally signed spam campaign spotted delivering malware

 
 

Disbanding the ‘Zoo’

Security

 

Disclosed Netgear Router Vulnerability Under Attack

Vulnerebility

 

Discover how many ways there were to hack your Apple TV

Hacking

 

Discovered a new DB containing more than 56 million records of US Voters

Hacking

 

Discovered an ISIL Bitcoin Address containing 3 Million dollars

ISIS

 

Disgusting! Ashley Madison was Building an App – 'What's your Wife Worth?'

Hacking

 

Distrust in use of personal data could hinder business growth

 
 

D-Link accidentally leaks code-signing certs in its firmware

 
 

D-Link Accidentally Leaks Private Code-Signing Keys 

 
 

D-Link Accidentally Publishes Its Private Code-Signing Keys on the Internet

Security

 

Dmail: A Chrome extension for sending self-destructing emails

 
 

Do CEOs know enough about cyber security?

 
 

Do CISOs deserve a seat at the leadership table?

 
 

Do conventional security measures negatively impact productivity?

 
 

Do security flaws with life-threatening implications need alternative disclosure?

 
 

Do we need harsher penalties and enforced data breach detection measures?

 
 

Do you have a Netgear ProSAFE NMS300? Here you are the exploit to hack it

Vulnerebility

 

Documents demonstrate NSA continued mass surveillance

NSA

 

Does Mr. Robot’s use real Hacking Tools? Which are?

News

 

Don’t set your iPhone’s Date to January 1, 1970 or your will brick it

Apple

 

Don’t throw away your old Boarding Pass, it may contain personal information

Security

 

Donald Trump — Boycott Apple! But Still Tweeting from an iPhone

Apple

 

Dow Jones & Company Latest Financial Firm Hit With Data Breach 

 
 

Dozens of games infected with Xiny available on the Google Play

Android

 

Dridex Banking Malware Back in Circulation

 
 

Dridex Botnets are still active and effective

Virus

 

DropboxCache Backdoor, a new Cross-Platform threat

Virus

 

DROWN Attack — More than 11 Million OpenSSL HTTPS Websites at Risk

Computer attack

 

Drupal moves to fix flaws in update process

 
 

Dutch Police Arrest Alleged CoinVault Ransomware Authors

 
 

Dutch Police Training Eagles to Take Down Rogue Drones

Security

 

Duuzer Trojan: A New Backdoor Targeting South Korean Organizations

Virus

 

Duuzer, a data stealer Trojan targets South Korean organizations

Virus

 

Dyre crackdown, the biggest effort to date by Russian authorities against cybercrime

Virus

 

Dyreza Trojan Targeting IT Supply Chain Credentials 

 
 

Easily exploitable Certifi-gate bug opens Android devices to hijacking

 
 

eBay Fixes XSS Flaw in Subdomain

 
 

eBook: 5 Essential Steps to PCI DSS Compliance

 
 

eBook: Cybersecurity for Dummies

 
 

eBook: Fighting Known, Unknown, and Advanced Threats

 
 

eBook: Website Security for Dummies

 
 

eDiscovery - An Enterprise Issue That Can't be Ignored 

 
 

Edward Snowden to discuss privacy at IP EXPO Europe 2015

 
 

eFast browser deletes and replaces your Chrome Browser

Security

 

EFF delves into privacy practices of Apple, Google, Twitter, and others

 
 

EFF Scoreboard – Secure Messaging, stay safe online

Security

 

EFF, AdBlock and Others Launch New Do Not Track Standard

 
 

EFF: T-Mobile breaks neutrality rules with Binge On service

 
 

EFF's Privacy Badger prevents users being tracked online

 
 

Elasticsearch servers actively targeted by botmasters

 
 

Email accounts belonging to 130 Celebrities have been Hacked

Hacking

 

Email is more secure today than it was two years ago

 
 

Email Security Device "nomx" Has Serious Flaws: Researchers 

 
 

Embedded Devices Share, Reuse Private SSH Keys, HTTPs Certificates 

 
 

EMEA organizations are being pre-emptive about security

 
 

Emergency Flash update plugs zero-day exploited in the wild

 
 

Emergency IE Patch Fixes Vulnerability Under Attack

 
 

Emergency Patch released for Latest Flash Zero-Day Vulnerability

Vulnerebility

 

Emergency. Hundreds of compromised WordPress sites serve TeslaCrypt ransomware

Virus

 

Employee credentials of half of European top 500 firms exposed online

 
 

Employee Stole 'Yandex Search Engine' Source Code, Tried to Sell it for Just $29K

Security

 

Employee use of cloud services puts business data at risk

 
 

ENCRYPT Act of 2016 — Proposed Bill Restricts States to Ban Encryption

Security

 

Encrypted Email Servers Seized by German Authorities After School Bomb Threats

Security

 

Encryption, Lock Mechanism Vulnerabilities Plague AppLock

 
 

Endpoint security lags in spite of vulnerabilities

 
 

Endress+Hauser Patches Buffer Overflow In Dozens of ICS Products

 
 

End-to-end encrypted database ZeroDB is now open source

 
 

Energy industry under unceasing attack in 2015

Computer attack

 

Energy security pros: More competent, or just naive?

 
 

Enhanced security for corporate information on mobile devices 

 
 

Enhanced security for corporate information on mobile devices 

 
 

ENISA Threat Landscape 2015, a must reading

Security

 

Entrust Datacard integrates with Citrix to enable secure anytime-anywhere productivity

 
 

EPIC Fail — For the Third Time, Linux Ransomware CRACKED!

Virus

 

Espionage campaign relying on the Zeus Trojan targets the Israeli Public Sector

Virus

 

EU plans to ban Bitcoin to curb terrorism funding

Security

 

EU regulation to Impose rules on firms to improve cybersecurity

Cyber Attack

 

Europe Emerges as Major Source of Cyber Attacks: Reports 

 
 

European Aviation Agency Warns of Aircraft Hacking

Hacking

 

European Aviation Safety Agency – Airplane hacking is reality

Hacking

 

European credit card payment terminals are plagued with serious flaws

Vulnerebility

 

European data centre services provider Interxion suffers breach

 
 

European law enforcement takes down Darknet marketplace

 
 

European Parliament members want member states to protect Edward Snowden

 
 

European Police Agencies declare war on DroidJack RAT

Virus

 

European police corps arrested operators behind darknets offering illegal products and services

Security

 

European Space Agency domains hacked by Anonymous

Hacking

 

Europe's new "net neutrality" regulation is full of loopholes

 
 

Europol Probing IS Setting Up of Social Network 

 
 

Europol, a new EU counter terrorism centre opening this month

Security

 

Europol, a new move against terrorism and money laundering

Security

 

Evaluating the security of open source software

 
 

Every Call You Make or Text You Send, They'll Be Tracking From Today

Security

 

Evolution and Escalation: Two Key Cyber Threat Trends 

 
 

Exabeam secures $25 million in Series B funding

 
 

Existing security standards do not sufficiently address IoT

 
 

Expedia users targeted by phisher who gained access to their info

 
 

Experian Breach Spills Data on 15 Million T-Mobile Customers 

 
 

Experian Breach: 15 Million T-Mobile Customers' Data Hacked

Crime

 

Experian’s data breach puts 15 million T-Mobile users at risk

Crime

 

Expert discovered how to hack any Facebook account

Social site

 

Expert discovered online data belonging to the trading firm AMP

 
 

Experts discovered the attack platform used by the Winnti Group

Virus

 

Experts warn Neutrino and RIG exploit kit activity spike

Virus

 

Exploit broker offers $1 million for reliable iOS 9 exploit

 
 

Exploit kit activity up 75 percent

 
 

Exploit Writing and Mitigation Going Hand in Hand

 
 

Exploitable Details of Intel's 'Apocalyptic' AMT Firmware Vulnerability Disclosed 

 
 

Exploiting Browser Cookies to Bypass HTTPS and Steal Private Information

Computer attack

 

Exploring the North American cybercriminal underground

 
 

Exposing cyberattacks targeting government networks in Southeast Asia

 
 

Exposing fraud behavior patterns associated with compromised identities

 
 

EZCast TV streaming stick leaves home networks vulnerable to attack

 
 

Facebook Awards $100,000 for New Class of Vulnerabilities and Detection Tool

Social site

 

Facebook first discovered spear phishing attacks of Iranian hackers on State Department employees

Hacking

 

Facebook introduces end-to-end encryption for notifications

 
 

Facebook is testing Self-Destructing Messages for Messenger App

Social site

 

Facebook M: Facebook's Answer to Siri, Cortana and Google Now

Technologies

 

Facebook Offering You $1000 to Run Advertisement Against Terrorism

Social site

 

Facebook slowly fine-tuning its popular ThreatExchange

 
 

Facebook starts warning users of state-sponsored attacks against their accounts

 
 

Facebook to Launch Its Own Satellite to Beam Free Internet

Technologies

 

Facebook tries to help advertisers and users with new ad control options

 
 

Facebook Updates Information-Sharing Platform

 
 

Facebook Will Now Notify You If NSA is Spying on You

Social site

 

Facebook wins Flash by knock out by switching to HTML5!

Social site

 

Facebook XSS could have allowed attackers to take over users’ accounts

Security

 

Facebook. Beware state-sponsored hackers are trying to hack you!

Social site

 

Facebook's Vice President Arrested in Brazil for Refusing to Share WhatsApp Data

Social site

 

Factors that influence breach costs

 
 

FAKBEN Ransomware-as-a-service emerges from the underground

Virus

 

Fake "account verification" email targeting Alibaba.com users

 
 

Fake recruiters on LinkedIn are targeting infosec pros

 
 

Fake Twitter verification profiles trick victims into sharing personal, payment card info

 
 

Fareit malware avoids detection using a different file hash for each attack

Virus

 

Fatboy Ransomware as a Service sets the ransom based on the victims’ location

 
 

FBI Admits — It was a 'Mistake' to Reset Terrorist's iCloud Password

Apple

 

FBI denies paying $1 MILLION to Unmask Tor Users

Security

 

FBI Deputy Director's Email Hacked by Teenager Who Hacked CIA Chief

Hacking

 

FBI Director — "What If Apple Engineers are Kidnapped and Forced to Write (Exploit) Code?"

Apple

 

FBI Director Asks Tech Companies to At least Don't Offer End-to-End Encryption

Security

 

FBI director insists Silicon Valley can solve the encryption dilemma - if they try hard enough

 
 

FBI is hunting MrGrey who has stolen 1.2 BILLION login credentials

Hacking

 

FBI must reveal the network investigative technique used to hack more than 1000 computers

Hacking

 

FBI reportedly Paid $1 Million to University Researchers for UnMasking Tor Users

Security

 

FBI Screwed Up — Police Reset Shooter's Apple ID Passcode that leaves iPhone Data Unrecoverable

Apple

 

FBI Suggests Ransomware Victims — 'Just Pay the Ransom Money'

Virus

 

FBI Warns of Increase in DDoS Extortion Scams

 
 

FBI Warns Public Officials of Doxing Threat

 
 

FBI warns Time Warner Cable of potential data breach

 
 

FBI: Social Engineering, Hacks Lead to Millions Lost to Wire Fraud

 
 

FBI’s Cyber Task Force Identifies Stealthy FF-RATs used in Cyber Attack

Cyber Attack

 

FCC Says Website Downtime Caused by DDoS Attacks 

 
 

Feasible ‘Going Dark’ Crypto Solution Nowhere to be Found

 
 

February 2016 Patch Tuesday – All Windows are affected by a critical flaw

Vulnerebility

 

Federal CISOs Propose New Efforts to Shore Up Cybersecurity

 
 

Federálové Change Policy vyžadovat rozkaz k použití Stingrays

 
 

Fewer IPsec VPN Connections at Risk from Weak Diffie-Hellman

 
 

File insecurity: the final data leakage frontier

 
 

File-stealing Firefox bug exploited in the wild, patch immediately!

 
 

FIN5 hacking crew steals 150,000 credit cards from casino

Hacking

 

FIN7 group has enhanced its phishing techniques

 
 

Final rule implements the Executive Order 13694. US can apply economic sanctions in response to cyber attacks

Security

 

Final TalkTalk breach tally: 4% of customers affected

 
 

Finally! A free, open source, on-premise virus scanner framework

 
 

Finance organizations risk data by failing to secure unique employee logins

 
 

Finance teams becoming involved in cyber risk mitigation oversight

 
 

Financial impact of SaaS storage breaches now $13.85 million

 
 

Financial Reporting Council of Nigeria site used for phishing scam

Security

 

FireEye Appliances affected by a critical flaw simply exploitable

Hardware

 

FireEye legally censors crucial parts of a researcher's talk at 44CON

 
 

Firefox 40: New features and critical security updates

 
 

Firefox 41 integrates Free Built-in Instant Messaging and Video Chat to Your Browser

Technologies

 

Firefox 42 is out, with many privacy and security improvements

 
 

Firefox blocks Flash plugin by default until zero-days are fixed 

 
 

Firefox blocks Flash plugin by default until zero-days are fixed 

 
 

Firewalls for SMBs that chew through encrypted streams

 
 

FIRST announces CVSS version 3

 
 

First Ever Anti-Drone Weapon that Shoots Down UAVs with Radio Waves

Technologies

 

First ever EU rules on cybersecurity

 
 

First Let’s Encrypt Free Certificate Goes Live

 
 

First Mac OS X Ransomware Targets Apple Users

Apple

 

First step in cross-platform Trojan bankers from Brazil done

Virus

 

Fitbit trackers can be infected with a malware in just 10 seconds

Virus

 

Fitbit, warranty fraud, and hijacked accounts

 
 

Five key cybersecurity trends for 2016

 
 

Five major Big Data predictions for 2016

 
 

Five points of failure in recovering from an attack

 
 

Five principal cloud security challenges

 
 

Five years of hardware and software threat evolution

 
 

Flash 0-day exploit found in Hacking Team's leaked data exploited by criminals

 
 

Flash Player 0-day exploited in the wild, patch immediately!

 
 

Flaw allows hijacking of professional surveillance AirLive cameras

 
 

Flaw in Comcast's home security system lets burglars in without triggering alarm

 
 

Flaw in Linux.Encoder1 ransomware reveals the decryption key

Virus

 

Flaw in Magento exposes millions of websites at risk of takeover

Vulnerebility

 

Flaw in the Android Gmail app opens to email spoofing attacks

Android

 

Flawed RANSOM_CRYPTEAR ransomware makes impossible the file recovery

Virus

 

Flaws Found in Evoko Meeting Room Management Devices 

 
 

Flaws in ATMs of a German Bank open the doors to cyber attacks

Computer attack

 

Flaws in industrial gas detectors exploitable by low-skilled attackers

 
 

Flaws in medical data management system can be exploited to modify patient information

 
 

For Better Privacy & Security, Change these iOS 9 Settings Immediately

Apple

 

Forensics Tool Flaw Allows Hackers to Manipulate Evidence 

 
 

Former DoE worker was hacking to steal nuclear secrets and resell them

Hacking

 

Former Employee tried to sell Yandex Source Code for Just $29K

Security

 

Former journalist faces 25 years in prison for article defacement

 
 

Four critical Android bugs patched, one could lead to permanent device compromise

 
 

Four essential tips that you can use to stay safe when you travel

 
 

Four Zero Days Disclosed in Internet Explorer Mobile

 
 

Fourth, a 16-year-old Hacker, Arrested over TalkTalk Hack

Hacking

 

Fragmented approaches to PKI don't always follow best practices

 
 

France could Fine Apple $1 Million for each iPhone it Refuses to Unlock

Apple

 

France wants to BAN Tor and Free Wi-Fi Services after Paris Terror Attacks

Security

 

France will not Ban Public Wi-Fi Or Tor Network, Prime Minister Valls Confirms

Security

 

Fraudsters steal nearly $47 million from Ubiquiti Networks

 
 

Free PCI and NIST compliant SSL test

 
 

Free Ransomware Decryption Tool — CoinVault and Bitcryptor

Virus

 

Free tool helps organizations respond to vulnerability reports

 
 

Free Web Hosting 000Webhost hacked, 13 Million users impacted

Hacking

 

Free WordPress plugin for a password-free login

 
 

French activist accuses Anonymous #OpParis of hindering Law Enforcement

ISIS

 

French Authorities Warn Against Spreading Leaked Macron Data 

 
 

French Gov could fine Apple and Google €1m unless they hack mobile devices

Apple

 

From Linux to Windows – New Family of Cross-Platform Desktop Backdoors Discovered

Vulnerebility

 

From Today Onwards, Don't You Even Dare to Use Microsoft Internet Explorer

Security

 

FTC amends telemarketing rule to ban payment methods used by scammers

 
 

FTC, Experts Push Startups to Think About Security From the Beginning 

 
 

Future attacks: Hiding exploit code in images

 
 

Fuze Collaboration Platform Allowed Anyone to Download Recorded Meetings 

 
 

GameOver Zeus gang boss also engaged in cyber espionage

 
 

Gary McGraw on Scalable Software Security and Medical Device Securityf

 
 

Gaza cybergang, where’s your IR team?

Security

 

Gemalto Breach Level Index report 2015, what are hackers looking for?

Hacking

 

General Motors invites hackers to report security flaws in their cars

 
 

German authorities approve the use of home-made Federal Trojan