A phishing scam emulating the Windows Update Service hit Australia yesterday, designed to not only emulate the update page perfectly, but circumvent current antivirus, spyware and adware programs.
A large cloud of lethal radioactive fallout could be released by a terrorist attack on the nuclear waste stored at up to 103 reactors in the US, according to an expert report for the US National Academy of Sciences.
Oh great, let's give 'em ideas!
The SANS Institute's Internet Storm Centre (ISC) has said that domain name system attacks are becoming more widespread since they were first reported last month.
A well-known security consultant on Tuesday urged cash-strapped businesses to consider using free, readily available open-source security tools and applications to help cope with the rising spate of malicious hacker attacks.
A flaw has been discovered in the popular open-source browser Firefox that could expose sensitive information stored in memory, Secunia has warned.
Florida-Cyber-security and counterterrorism analyst Roger Cressey on Monday pleaded with IT executives not to underestimate the threat of "national cyber-event" targeting critical infrastructure in the United States.
Daniel McNeil has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
Several distributors of the BSD version of the Telnet protocol have released patches for a critical bug that could cause system-hijack attacks. Advisories and patches have been issued by FreeBSD, MIT (Kerberos), Red Hat, and Sun among others.
Today I have the unfortunate responsibility of informing you that there has been a decision made by bureaucrats of a Federal agency that takes away your right to privacy as guaranteed by the United States Constitution.
This decision was unilaterally made by the National Telecommunications and Information Association ("NTIA") -- http://www.ntia.doc.gov/ -- without hearings that would determine the impact on those affected, and delivered without notice -- in short, the NTIA decision was made without due process of any kind. This is exactly how our government is not supposed to work.
A Colorado company sued by Microsoft Corp. under anti-spam laws has filed for Chapter 11 bankruptcy.
If people didn't fall for online scams, online scammers would take up another line of work. And really, it isn't terribly hard to protect yourself. If you do one thing today, print out the following list and tape it to your computer.
A thief recently walked into a University of California, Berkeley office and swiped a computer laptop containing personal information about nearly 100,000 alumni, graduate students and past applicants, highlighting a continued lack of security that has increased society's vulnerability to identity theft.
Leading global telecommunications companies, Internet service providers and network operators will begin sharing information on Internet attacks as members of a new group called the Fingerprint Sharing Alliance, according to a published statement from the new group.
Purely objective information about security issues is becoming one of the scarcest commodities in the tech industry.
Corporations, government agencies and even consumers are tinkering with open-source software, which can be downloaded free from the Internet.
Doubts were cast this week over the security of three major software systems formerly regarded as safe havens from hacker attacks and viruses.
But experts argue that despite the new findings, these systems are still more secure than their Microsoft counterparts because hackers overwhelmingly target the Windows software.
Symantec blames Trojans for an upsurge in client-side exploits for web browsers. Between July and December 2004 Symantec documented 13 vulnerabilities affecting Internet Explorer and 21 vulnerabilities affecting each of the Mozilla browsers. Six vulnerabilities were reported in Opera and none in Safari.
Hackers gained personal information of 59,000 people affiliated with a California university - the latest in a string of high-profile cases of identity theft.
A M$ funded report released today indicates Windows Server 2003 may actually be more secure than its most popular Linux competitors.
It isn't like it was 'co-funded' by both Microsoft and Red Hat," said Michael D. "Mick" Bauer, senior editor of Linux Journal.
Identity thieves are going wireless in their quest to steal your personal info.
You may want to think twice before logging into a public wireless hotspot. Sure, grabbing a few minutes of connectivity is convenient, but identity thieves are discovering that, through "evil twin" attacks, hotspots are a great way to steal unsuspecting users' private information. So how does an evil twin attack work?