Adobe kills two actively exploited bugs in Reader Unscheduled update coming to Windows machine near you Security17 Dec 2011 | 23
Judge dismisses charges against accused Twitter stalker Offensive tweets protected by US Constitution Legal16 Dec 2011 | 26
US spy drone hijacked with GPS spoof hack, report says Electronic warfare comes of age – in Iran Security15 Dec 2011 | 158
Visa probes reported security breach of card processor 17,000 cards already blocked Security15 Dec 2011 | 11
Feds charge eight former Siemens officials with bribery $100m allegedly paid to secure Argentine identity cards Legal15 Dec 2011 | 14
Newfangled graphics engine for browsers fosters data theft The shady truth behind CSS shaders Security14 Dec 2011 | 23
SCADA vuln imperils critical infrastructure, feds warn Secret accounts open control systems to attack Security14 Dec 2011 | 27
Espionage hack attack preys on chemical firms Spotted in the wild: Nitro Part II Security12 Dec 2011 | 3
Malicious apps infiltrate Google's Android Market Bogus games purged after more than 10,000 downloads Security12 Dec 2011 | 88
Four Romanians charged with hacking 150 Subway shops Point-of-sale breach reaps millions in ill-gotten gains Security09 Dec 2011 | 33
Chrome is the most secured browser - new study Firefox finishes last in 3 browser security race Security09 Dec 2011 | 101
Digital certificate authority suspends ops following breach Hackers access database, gain control over website Security08 Dec 2011 | 9
Man fights felony hacking charge for accessing wife's email Gmail showed her having extramarital affair Security07 Dec 2011 | 55
Military contractor warns of new Adobe Reader exploit Attacks already under way Security06 Dec 2011 | 10
Facebook security hole exposes Zuckerberg's privates And possibly yours, too Security06 Dec 2011 | 34
It's ba-ack. Exploit revives slain browser history bug Attack reveals recently visited websites Security05 Dec 2011 | 22
Carrier IQ VP: App on millions of phones not a privacy risk Like tiny fish through a net, key taps dropped from memory Security02 Dec 2011 | 119
Does your smartphone run Carrier IQ? Find out here Apple, AT&T, Sprint confirm; Nokia, RIM, Verizon deny Security01 Dec 2011 | 70
US Senator demands answers from Carrier IQ Al Franken calls smartphone tracker on the carpet Security01 Dec 2011 | 52
Duqu attackers: master coders, Linux rookies Amateur goofs doom global wipe of C&C servers OSes01 Dec 2011 | 31
Android glitch allows hackers to bug phone calls Attack pierces defenses on devices from HTC, Samsung, Motorola, Google Security30 Nov 2011 | 43
BUSTED! Secret app on millions of phones logs key taps Researcher says seeing is believing Security30 Nov 2011 | 206
Google researchers propose fix for ailing SSL system Changes would overhaul net's foundation of trust Security29 Nov 2011 | 29
Malls suspend plan to track shoppers' cellphones Privacy concerns rain on retailer's snoop fest Security29 Nov 2011 | 33
Twitter crypto purchase leaves Egypt dissidents in lurch Android privacy service goes dark Security28 Nov 2011 | 6
Assange shocker: 'Of course I'm a goddamn journalist' Meanwhile, overhauled whistle-blower system delayed Legal28 Nov 2011 | 13
Software maker sorry for trying to silence security researcher Withdraws legal threats over mobile 'rootkit' claims Security24 Nov 2011 | 18
Browser plugin brings strong crypto to Google webmail (Some restrictions apply) Security23 Nov 2011 | 5
Apple one-day-only sale plans for Macs, iPads leaked to web iPhone discounts a no show On-Prem23 Nov 2011 | 42
FBI: No evidence of water system hack destroying pump Probe into SCADA breach continues Security23 Nov 2011 | 7
Google mail crypto tweak makes eavesdropping harder 'Forward secrecy' protects data for the long term Security22 Nov 2011 | 7
'Organized' hack targets AT&T wireless subscribers 'Auto script' attack fails to breach accounts Security21 Nov 2011 |
Smart meters blamed for Wi-Fi, garage opener interference Utility not doing enough, advocate says Security21 Nov 2011 | 28
Second water utility reportedly hit by hack attack Proof-of-concept intrusion Security18 Nov 2011 | 28
World's first Win 8 malware 'bootkit' to debut next week 'Stoned Lite' too impaired to defeat UEFI OSes18 Nov 2011 | 14
Water utility hackers destroy pump, expert says Updated SCADA breach 'a really big deal' Security17 Nov 2011 | 67
Crooks make it rain by seeding cloud with zombies Your compute resources rented out Security17 Nov 2011 | 9
Facebook vows 'consequences' for extreme porn scammers Updated Responsible parties already identified Security16 Nov 2011 | 11
Windows 8 aims to make security updates less painful Fewer restarts, less desktop clutter OSes16 Nov 2011 | 60
'Devastating' protocol flaw could paralyze Bitcoin system Scientists propose 'Red Balloon' incentive solution Security15 Nov 2011 | 27
US anti-hacking law turns computer users into criminals Former prosecutor calls for change to CFAA Legal15 Nov 2011 | 32
Hackers port iPhone 4S' Siri to rival devices Apple's personal assistant cracked open Security15 Nov 2011 | 33
World's stealthiest rootkit pushes DNS hijacking trojan DNS Changer dropped by TDSS Security14 Nov 2011 | 17
Certificate stolen from Malaysian gov used to sign malware Security warnings bypassed Security14 Nov 2011 | 4
Tour de France winner sentenced for hack of doping lab Trojan siphoned 1,700 confidential files Security12 Nov 2011 | 19
Duqu targeted each victim with unique files and servers Well-financed developers had sense of humor OSes11 Nov 2011 | 9
Feds win access to WikiLeakers Twitter account data No Constitutional violations, judge says Legal11 Nov 2011 | 16
Death match between site and writer over Twitter account Account with 17,000 followers appraised at $340,000 Legal10 Nov 2011 | 11
Apple kills code-signing bug that threatened iPhone users Hacker who discovered it remains excommunicated Security10 Nov 2011 | 21
City IT manager accused of brazenly stealing mayor's email Automated script made it easy, feds say Security10 Nov 2011 | 9
Feds shutter DNS malware scam that infected 4 million PCs $14m scheme attacked Macs as well as Windows Security09 Nov 2011 | 2
Microsoft releases fix for Applocker bypass flaw Windows vault easily opened with macros OSes09 Nov 2011 | 11
Duqu spawned by 'well-funded team of competent coders' World's first known modular rootkit does steganography, too Security09 Nov 2011 | 12
US Supremes liken GPS tracking to 1984's Big Brother 24/7 surveillance, no warrant needed (maybe) Security08 Nov 2011 | 21
Advertiser settles charges for use of Adobe Flash cookies Makes it easier to stop online tracking Security08 Nov 2011 | 5