Publication: Computerworld Malware and Vulnerabilities News

First reported 5 hours ago - Updated 1 hour ago - 1 reports

11 signs you've been hacked -- and how to fight back

Redirected Net searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned ... [Published Computerworld Malware and Vulnerabilities News - 5 hours ago]
First reported 13 hours ago - Updated 1 hour ago - 1 reports

Bugcrowd guide aims to smooth the way for reporting software flaws

Handling a software flaw can be messy, both for a security researcher who found it and for the company it affects. But a new set of guidelines aims to make that interaction less mysterious and confrontational. ... [Published Computerworld Malware and Vulnerabilities News - 13 hours ago]
Entities: Interaction, Security
First reported 3 hours ago - Updated 3 hours ago - 1 reports

Russian gov't is willing to pay for a way to ID Tor users

The Russian Ministry of Interior is willing to pay 3.9 million roubles, or around $111,000, for a method to identify users on the Tor network. ... [Published Computerworld Malware and Vulnerabilities News - 3 hours ago]
First reported Jul 24 2014 - Updated 4 hours ago - 1 reports

Thousands of sites compromised by WordPress plug-in flaw

A critical vulnerability found recently in a popular newsletter plug-in for WordPress is actively being targeted by hackers and was used to compromise an estimated 50,000 sites so far. ... [Published Computerworld Malware and Vulnerabilities News - Jul 24 2014]
First reported Jul 24 2014 - Updated 22 hours ago - 1 reports

Firm says vulnerability in Tails contained in I2P component

A vulnerability broker published a video demonstrating one of several flaws it has found in the privacy-focused Tails operating system, which is used by those seeking to make their Web browser harder to trace. ... [Published Computerworld Malware and Vulnerabilities News - Jul 24 2014]
First reported Jul 23 2014 - Updated Jul 23 2014 - 1 reports

File-encrypting Android ransomware 'Simplocker' targets English-speaking users

A ransomware threat that encrypts files stored on the SD memory cards of Android devices has been updated to target English-speaking users with FBI-themed alerts. ... [Published Computerworld Malware and Vulnerabilities News - Jul 23 2014]
First reported Jul 23 2014 - Updated Jul 23 2014 - 1 reports

SQL injection flaw opens door for Wall Street Journal database hack

A vulnerability in a web-based graphics system led to a breach of The Wall Street Journal's network by a hacker, the newspaper acknowledged late Tuesday. ... [Published Computerworld Malware and Vulnerabilities News - Jul 23 2014]
First reported Jul 22 2014 - Updated Jul 22 2014 - 1 reports

Tor Project working to fix weakness that can unmask users

Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users. ... [Published Computerworld Malware and Vulnerabilities News - Jul 22 2014]
First reported Jul 21 2014 - Updated Jul 22 2014 - 1 reports

Open Wireless Router project aims for better router security, network performance

Advocacy group the Electronic Frontier Foundation wants to address the poor security track record of home routers with a new firmware project that will encourage users to share their Internet connection publicly by setting up guest Wi-Fi networks. ... [Published Computerworld Malware and Vulnerabilities News - Jul 21 2014]
First reported Jul 21 2014 - Updated Jul 22 2014 - 1 reports

EFF releases Chrome, Firefox plugin to block third-party tracking

The Electronic Frontier Foundation, a digital privacy rights group, has released a downloadable plugin for Chrome and Firefox designed to stop third parties from tracking people's Web browsing. ... [Published Computerworld Malware and Vulnerabilities News - Jul 21 2014]
First reported Jul 21 2014 - Updated Jul 22 2014 - 1 reports

Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker

Cybercriminals are spreading a new file-encrypting ransomware program that's more powerful and resilient than Cryptolocker, a threat recently shut down by the U.S. Department of Justice. ... [Published Computerworld Malware and Vulnerabilities News - Jul 21 2014]
First reported Jul 18 2014 - Updated Jul 18 2014 - 2 reports

Home router security to be tested in Defcon contest

Researchers are gearing up to hack an array of different home routers during a contest next month at the Defcon 22 security conference. ... [Published Computerworld Malware and Vulnerabilities News - Jul 18 2014]
Entities: Router, Security

More Content

All (304) | News (0) | Reports (0) | Blogs (304) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Russian gov't is willing to pay for a way to ID... [Published Computerworld Malware and Vulnerabilities News - 3 hours ago]
11 signs you've been hacked -- and how to f... [Published Computerworld Malware and Vulnerabilities News - 5 hours ago]
Bugcrowd guide aims to smooth the way for repor... [Published Computerworld Malware and Vulnerabilities News - 13 hours ago]
Thousands of sites compromised by WordPress plu... [Published Computerworld Malware and Vulnerabilities News - Jul 24 2014]
Firm says vulnerability in Tails contained in I... [Published Computerworld Malware and Vulnerabilities News - Jul 24 2014]
File-encrypting Android ransomware 'Simplocker'... [Published Computerworld Malware and Vulnerabilities News - Jul 23 2014]
SQL injection flaw opens door for Wall Street J... [Published Computerworld Malware and Vulnerabilities News - Jul 23 2014]
Tor Project working to fix weakness that can un... [Published Computerworld Malware and Vulnerabilities News - Jul 22 2014]
EFF releases Chrome, Firefox plugin to block th... [Published Computerworld Malware and Vulnerabilities News - Jul 21 2014]
Open Wireless Router project aims for better ro... [Published Computerworld Malware and Vulnerabilities News - Jul 21 2014]
Stealthy ransomware 'Critroni' uses Tor... [Published Computerworld Malware and Vulnerabilities News - Jul 21 2014]
Home router security to be tested in Defcon con... [Published Computerworld Malware and Vulnerabilities News - Jul 18 2014]
Home router security to be tested in upcoming h... [Published Computerworld Malware and Vulnerabilities News - Jul 18 2014]
Aloha point-of-sale terminal, sold on eBay, yie... [Published Computerworld Malware and Vulnerabilities News - Jul 18 2014]
Emergency vBulletin patch fixes SQL injection v... [Published Computerworld Malware and Vulnerabilities News - Jul 17 2014]
Flaw exposes some Cisco home wireless devices t... [Published Computerworld Malware and Vulnerabilities News - Jul 17 2014]
Almost a million fake apps are targeting your p... [Published Computerworld Malware and Vulnerabilities News - Jul 16 2014]
Kenneth van Wyk: We can't just blame users [Published Computerworld Malware and Vulnerabilities News - Jul 16 2014]
Google sets up a cybercrime-busting task force ... [Published Computerworld Malware and Vulnerabilities News - Jul 15 2014]
Google sets up ca ybercrime-busting task force ... [Published Computerworld Malware and Vulnerabilities News - Jul 15 2014]
Feds declare big win over Cryptolocker ransomware [Published Computerworld Malware and Vulnerabilities News - Jul 15 2014]
New banking malware 'Kronos' advertised... [Published Computerworld Malware and Vulnerabilities News - Jul 14 2014]
Future Java 7 patches will work on Windows XP d... [Published Computerworld Malware and Vulnerabilities News - Jul 14 2014]
How to sign up for Microsoft's restored securit... [Published Computerworld Malware and Vulnerabilities News - Jul 14 2014]
LastPass discloses now-fixed flaws ahead of sec... [Published Computerworld Malware and Vulnerabilities News - Jul 14 2014]
Oracle to release 115 security patches [Published Computerworld Malware and Vulnerabilities News - Jul 11 2014]
The Gameover Trojan program is back [Published Computerworld Malware and Vulnerabilities News - Jul 11 2014]
Source code for tiny 'Tinba' banking malware le... [Published Computerworld Malware and Vulnerabilities News - Jul 11 2014]
Gmail users on iOS at risk of data theft [Published Computerworld Malware and Vulnerabilities News - Jul 11 2014]
International police operation disrupts Shylock... [Published Computerworld Malware and Vulnerabilities News - Jul 10 2014]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Russian gov't is willing to pay for a way to ID... [Published Computerworld Malware and Vulnerabilities News - 3 hours ago]
The Russian Ministry of Interior is willing to pay 3.9 million roubles, or around $111,000, for a method to identify users on the Tor network. ...
11 signs you've been hacked -- and how to f... [Published Computerworld Malware and Vulnerabilities News - 5 hours ago]
Redirected Net searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned ...
Bugcrowd guide aims to smooth the way for repor... [Published Computerworld Malware and Vulnerabilities News - 13 hours ago]
Handling a software flaw can be messy, both for a security researcher who found it and for the company it affects. But a new set of guidelines aims to make that interaction less mysterious and confrontational. ...
Thousands of sites compromised by WordPress plu... [Published Computerworld Malware and Vulnerabilities News - Jul 24 2014]
A critical vulnerability found recently in a popular newsletter plug-in for WordPress is actively being targeted by hackers and was used to compromise an estimated 50,000 sites so far. ...
Firm says vulnerability in Tails contained in I... [Published Computerworld Malware and Vulnerabilities News - Jul 24 2014]
A vulnerability broker published a video demonstrating one of several flaws it has found in the privacy-focused Tails operating system, which is used by those seeking to make their Web browser harder to trace. ...
1 2 3 4 5 6 7 8 9 10 ...
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.