News (Page 1 of 71)   1 2 3 4 5 6 7 8 9 10 11  Next >
Change in Focus
Since its inception in 1999, SecurityFocus has been a mainstay in the security community.
By: SecurityFocus Staff, SecurityFocus 2010-03-10

PhotoDNA scans images for child abuse
Microsoft and Dartmouth College donate a software tool for detecting modified images to help ISPs find child pornography on their networks.
By: Robert Lemos, SecurityFocus 2009-12-18

Twitter attacker had proper credentials
The social networking service's DNS provider says that all changes to its system were from an authenticated user.
By: Robert Lemos, SecurityFocus 2009-12-18

Conficker data highlights infected networks
The ShadowServer Foundation creates a portal highlighting which networks show significant signs of compromises, including networks in Vietnam, Indonesia, and Ukraine.
By: Robert Lemos, SecurityFocus 2009-12-16

Popular apps need better patching, says report
A report using data from two security vendors finds that ubiquitous applications, such as Apple's QuickTime and Adobe Flash, are not patched fast enough by their users.
By: Robert Lemos, SecurityFocus 2009-09-17

Hacker charged with Heartland, other breaches
A federal grand jury indicts a Florida man already charged with stealing data from TJX with allegedly helping breach five more companies.
By: Robert Lemos, SecurityFocus 2009-08-18

Web attacks hit U.S., South Korean sites
In its fourth day, a widespread distributed denial-of-service attack continued to inundate U.S. government and South Korean Web sites with network traffic.
By: Robert Lemos, SecurityFocus 2009-07-08

FTC persuades court to shutter rogue ISP
A federal district court shuts down Triple Fiber Network, after the Federal Trade Commission documents the Internet service provider's cooperation with online criminals and child pornographers.
By: Robert Lemos, SecurityFocus 2009-06-05

Obama launches cybersecurity initiative
The U.S. president announces that the nation's networks will be considered a "strategic national asset" and creates a top position in the White House to formulate a better cybersecurity policy.
By: Robert Lemos, SecurityFocus 2009-05-29

Browsers bashed first in hacking contest
A security researcher keeps a vulnerability on ice for an entire year, before using it at the Pwn2Own contest to exploit Apple's browser. Microsoft's Internet Explorer 8 falls soon after.
By: Robert Lemos, SecurityFocus 2009-03-18

News (Page 1 of 71)   1 2 3 4 5 6 7 8 9 10 11  Next >


Privacy Statement
Copyright 2010, SecurityFocus