Computer Security Newswire (Page 9)

Comprehensive Real-Time News Feed for Computer Security. (Page 9)

Results 161 - 180 of 115,356 in Computer Security

  1. a This week's London Bombings anniversary must remind us not to be bounced into a police stateRead the original story w/Photo

    Yesterday | Russia Taday

    Beginning his working life in the aviation industry and trained by the BBC, Tony Gosling is a British land rights activist, historian & investigative radio journalist.

    Comment?

  2. Authorities and private firms collaborate to combat Shylock malwareRead the original story w/Photo

    Yesterday | Computing.co.uk

    Law enforcement agencies and internet security firms have joined together in an international operation to combat the Shylock Trojan malware.

    Comment?

  3. Askaboutmoney users reassured after hackingRead the original story w/Photo

    Yesterday | RTE.ie

    The popular online personal finance forum, Askaboutmoney.com, has asked its users to change their passwords as a precaution after the site was hacked.

    Comment?

  4. Shylock malware has taken a hit from EuropolRead the original story

    Yesterday | Aurora Era-Banner

    Europol has seized control of domains and servers being used to propagate Shylock malware used against banks around the world.

    Comment?

  5. Indicted Russian's Family Claim His InnocenceRead the original story w/Photo

    Yesterday | ABC News

    Family members of a Russian man charged with hacking in the United States insist he is innocent and fear incarceration will kill him.

    Comment?

  6. textRead the original story

    Yesterday | VermontGuides.com

    ... of hyper-connectivity come the drawbacks of "social engineering" attacks. Surprisingly, today's biggest computer security threat is not malware, unpatched software, or obsolete firewalls; it could be the behavior of your own staff. Social engineers ...

    Comment?

  7. Police, security firms team up and take down Shylock malwareRead the original story w/Photo

    Yesterday | ZDNet

    International law enforcement and security experts have disrupted the activities of the financial Trojan Shylock, according to the UK National Crime Agency .

    Comment?

  8. .com | Security-linked website hacked in SudanRead the original story w/Photo

    Yesterday | News24

    A Zimbabwean court has reportedly upheld the eviction of a disabled white commercial farmer who sought compensation after his farm was seized under the country's controversial land reform programme.

    Comment?

  9. Singapore Host Advises Customers to Take Necessary Precautions...Read the original story

    Yesterday | SFGate

    Timthumb security loophole has plagued websites once again and Singapore Host customers are advised steps to take to protect their websites from possible attacks.

    Comment?

  10. BRIEF: President: No online attacks reported to Prosperity Bank online usersRead the original story

    Yesterday | Hispanic Business

    An email was sent out to users of the website Wednesday to warn them about an anticipated online attack Thursday, said .

    Comment?

  11. Apple's iPhone branded a 'national security concern'Read the original story w/Photo

    Yesterday | ZDNet

    Apple's iPhone has been labelled a "national security concern" by Chinese state broadcasters as relations between the country and US over cybersecurity worsen.

    Comment?

  12. Community College Cybersecurity Educators Gather to Address Workforce ShortageRead the original story

    Yesterday | PRWeb

    Community college faculty and administration are coming together at the first annual Community College Cyber Summit , July 21st and 22nd, at Moraine Valley Community College in Palos Hills, Illinois.

    Comment?

  13. DOJ Opts Against Launching Criminal Probe in CIA-Senate SpatRead the original story w/Photo

    Yesterday | KBOI-AM Boise

    The Department of Justice declined to launch a criminal probe after both the Senate Intelligence Committee and the CIA accused each other of improperly accessing the other's computers.

    Comment?

  14. Keep business data safe from inside threatsRead the original story w/Photo

    Yesterday | BetaNews

    The ability to print directly from the cloud or a mobile phone or tablet creates obvious advantages, helping to make everyday business activities much more efficient.

    Comment?

  15. Businesses will experience cyber-attacks: Deloitte report outlines...Read the original story w/Photo

    Yesterday | Trend

    Today's C-suite must deploy a cyber-defense that is secure, vigilant, and resilient, according to a report released on26 June 2014 by Deloitte Touche Tohmatsu Limited .

    Comment?

  16. HackaTeslaThon: Break Into a Tesla Model S, Win Some DoughRead the original story w/Photo

    Yesterday | Car and Driver

    We're not sure why it took this long, but Silicon Valley's automotive darling, the Tesla Model S, is finally being hacked-although not in the way you might think.

    Comment?

  17. Critical Infrastructure Firms Lag Behind in Cyber-Attack DefensesRead the original story w/Photo

    Yesterday | CNet News

    Utilities, industrial manufacturers and energy companies expect cyber-attacks in the next year, but these organizations continue to react to threats, rather than build up security measures, according to the latest Ponemon survey.

    Comment?

  18. CVE-2014-4851Read the original story

    Thursday | National Vulnerability Database

    ... vulnerability management, security measurement, and compliance (e.g. FISMA). NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security's National Cyber Security Division . It supports the U.S. ...

    Comment?

  19. So You've Got A Cybersecurity Policy - What Next?Read the original story

    Thursday | JD Supra

    After hearing about the major data breaches at companies like Target, Michael's, and Neiman Marcus, ABC Corp. realizes it needs to protect itself from such an attack.

    Comment?

  20. Malwarebytes, Started by Teenager, Raises $30 Million to Battle MalwareRead the original story w/Photo

    Thursday | Wall Street Journal

    ... the computer after three days of going back and forth. The incident sparked Mr. Kleczynski's interest in computer security. He started by writing free software tools in Visual Basic that would have made his parents' computer easier to fix. He met ...

    Comment?