Results 1 - 10 of about 63:

Michael Mimoso / Threatpost:
Vulnerability in embedded web server software from 2002 leaves about 12M home routers exposed   —  12 Million Home Routers Vulnerable to Takeover  —  More than 12 million devices running an embedded webserver called RomPager are vulnerable to a simple attack that could give a hacker man …
Dec 18, 2014, 5:15 PMIn context
Michael Mimoso / Threatpost:
Palo Alto Networks finds factory-installed backdoor on Android devices from China's Coolpad   —  Manufacturer's Backdoor Found on Popular Chinese Android Smartphone  —  A popular Android smartphone sold primarily in China and Taiwan but also available worldwide, contains a backdoor …
Dec 18, 2014, 1:10 AMIn context
Michael Mimoso / Threatpost:
Report: Iranian hackers compromised critical infrastructure worldwide in Operation Cleaver   —  Report Connects Iran to Critical Infrastructure Hacks Worldwide  —  Iranian state-sponsored hackers have been singled out for attacks on critical infrastructure worldwide, including 10 targets in the United States.
Dec 2, 2014, 10:40 PMIn context
Michael Mimoso / Threatpost:
Regin Cyberespionage Platform Also Spies on GSM Networks   —  Researchers have uncovered a complex espionage platform reminiscent of Duqu that has been used since at least 2008 not only to spy on and extract email and documents from government agencies, research institutions and banks …
Nov 25, 2014, 1:30 AMIn context
Dennis Fisher / Threatpost:
Google Removes SSLv3 Fallback Support From Chrome   —  Google has released Chrome 39, fixing 42 security vulnerabilities and removing support for the fallback to SSLv3, the component that was the target of the POODLE attack revealed last month.  —  When the POODLE attack was disclosed …
Nov 19, 2014, 10:55 AMIn context
Dennis Fisher / Threatpost:
Google open sources nogotofail, a tool to test the security of any device or application on the internet   —  Google Releases Nogotofail Tool to Test Network Security  —  The last year has produced a rogues' gallery of vulnerabilities in transport layer security implementations and new attacks …
Nov 4, 2014, 11:30 PMIn context
Dennis Fisher / Threatpost:
Researcher Finds Tor Exit Node Adding Malware to Binaries   —  A security researcher has identified a Tor exit node that was actively patching binaries users download, adding malware to the files dynamically.  The discovery, experts say, highlights the danger of trusting files downloaded …
Oct 25, 2014, 7:30 PMIn context
Dennis Fisher / Threatpost:
Insider breach at AT&T compromises Social Security and drivers' license numbers; company offers credit monitoring to those affected   —  AT&T Hit By Insider Breach  —  AT&T is warning consumers about a data breach involving an insider who illegally accessed the personal information of an unspecified number of users.
Oct 6, 2014, 6:35 PMIn context
Dennis Fisher / Threatpost:
Google, Dropbox, and others launch open source security organization Simply Secure   —  New Initiative Simply Secure Aims to Make Security Tools Easier to Use  —  The dramatic revelations of large-scale government surveillance and deep penetration of the Internet by intelligence services …
Sep 19, 2014, 10:55 AMIn context
Dennis Fisher / Threatpost:
FTC Settles With Fandango, Credit Karma Over SSL Issues in Mobile Apps   —  The makers of two major mobile apps, Fandango and Credit Karma, have settled with the Federal Trade Commission after the commission charged that they deliberately misrepresented the security of their apps and failed to validate SSL certificates.
Mar 28, 2014, 7:30 PMIn context

Sponsor Posts

Open source and the cloud: Changing the lives of people with Type 1 diabetes  —  Parents and patients have figured out how to remotely keep watch over glucose levels via smartphones, computers and the Pebble smartwatch running on Microsoft Azure.
Amazon Cognito:
Amazon Cognito - User Identity and Data Synchronization Service  —  Save mobile user data in the cloud and access it even when users are offline.  Get free 10GB storage & 1 Million Syncs per month now.
Amazon WorkSpaces:
Desktop in the cloud with Amazon WorkSpaces  —  Manage secure desktops from multiple devices.  Amazon WorkSpaces is managed, secure & simple.  Scale up and down easily.  Get started today.
Have you found the right contact management tool yet?  —  Can you use an axe to prune roses, or a hacksaw to chop veggies?  —  They may get the job done, but is either of them the right tool for the job?
All the coding ladies  —  Much has been said about women in technology this week as a result of Barbie once again, letting down the female population (or more appropriately, humankind as a whole) …