HomeBlogsSecurity Watch

Security Watch

Exchange Patch Could Bring E-Mail Hell

Microsoft is issuing a critical security bulletin for Exchange on next week's Patch Tuesday that's likely to leave some employees squawking and without e-mail...

Bank Docs Found in Trash Are Legit

JPMorgan Chase has confirmed that the papers pulled from its trash cans by Service Employees International Union representatives are legitimate bank documents.The documents, taken...

MS DNS Patch on the Way

Microsoft will patch seven security flaws, including the critical DNS server flaw, outlined in its 935964 advisory, on Patch Tuesday—May 8.The DNS patch is...

Labor Union Posts Video of Bank Docs Pulled from Trash

After receiving copies of documents pulled from the trash earlier this week, JPMorganChase will be contacting customers whose identities may have been compromised.The documents...

Maggoty Hamburgers, Spam Assassination and Mal/Iframe, Oh My

April saw the emergence of company character assassination spam, image spam variations and the dominance of Mal/Iframe—malware that crawls legitimate sites for holes into...

MS Closes the Edge-Server-Client Security Loop

In a worldwide kickoff event that involved 50,000 people, Microsoft on May 2 launched the client piece of its aggressive client-server-edge enterprise security software...

Apple Fixes QuickTime Hole

Apple has stitched up the hole in QuickTime that allowed hackers at the CanSecWest security show to take over a MacBook Pro in a...

E-Gold E-ndicted for Fronting Child Pornsters, Fraudsters

E-Gold, what F-Secure calls a "very prominent" digital currency for criminals, has been indicted for money laundering, conspiracy and operating an unlicensed money transmitting...

Google Stomps Out Malicious Sponsored Links

Google has shuttered AdWord accounts that have been serving up malware while masquerading as known and trusted sites, such as Better Business Bureau and...

NY Teen Hacks, Infects and Dissects AOL

A New York teenager with a grudge has admitted to hacking AOL, getting into its internal networks and databases, planting a Trojan, and spear...