Feed aggregator

Threatpost News Wrap, September 19, 2014

Threatpost for B2B - Fri, 09/19/2014 - 11:19
Dennis Fisher and Mike Mimoso talk abut the crazy news of the last couple of weeks, the Apple privacy and Apple Pay announcements, the details of the Home Depot breach and the end of the Microsoft Trustworthy Computing unit.

Era Ends With Break Up of Trustworthy Computing Group at Microsoft

Threatpost for B2B - Fri, 09/19/2014 - 10:43
In a move that has surprised many in the security community, Microsoft has disbanded its Trustworthy Computing unit, the group that was responsible for the pioneering work that helped reverse the company’s security reputation and make Windows a much more secure and reliable computing platform. The end of the TwC group comes as Microsoft is in […]

56 Million Payment Cards At Risk in Home Depot Data Breach

Threatpost for B2B - Thu, 09/18/2014 - 16:46
The Home Depot data breach put 56 million payment cards at risk, the company said today, adding that the attackers used custom malware in the breach.

OWASP Releases Latest App Sec Guide

Threatpost for B2B - Thu, 09/18/2014 - 13:24
OWASP published the latest iteration of its Testing Guide, an informational manual designed to teach developers how to build and maintain secure application.

CVE Identifiers Make Room For a Few More Digits

Threatpost for B2B - Thu, 09/18/2014 - 12:37
The deadline for a syntax change for CVE identifiers is coming on Jan. 13 when the four-digit format will support five or more. Vendors must update vulnerability management products to support the new syntax.

Chinese Penetrate TRANSCOM Amid Lack of Data Sharing

Threatpost for B2B - Thu, 09/18/2014 - 11:18
TRANSCOM, the Defense Department command that handles wartime military logistics was compromised repeatedly over a one-year span by a handful of Chinese APT groups.

New Initiative Simply Secure Aims to Make Security Tools Easier to Use

Threatpost for B2B - Thu, 09/18/2014 - 10:43
The dramatic revelations of large-scale government surveillance and deep penetration of the Internet by intelligence services and other adversaries have increased the interest of the general public in tools such as encryption software, anonymity services and others that previously were mainly of interest to technophiles and activists. But many of those tools are difficult to use […]

Dyre Trojan Caught In The Cookie Jar

Threatpost for B2B - Thu, 09/18/2014 - 09:57
Researchers at Adallom analyzed a sample of the Dyre banking Trojan that was found to be targeting Salesforce.com credentials.

Apple CEO Tim Cook Says Company Dedicated to Protecting Users’ Privacy

Threatpost for B2B - Thu, 09/18/2014 - 09:40
While much of the tech community is still swooning over the iPhone 6, Apple Pay and Apple Watch, the company’s top executive is spending a lot of time and energy trying to reassure customers that Apple is doing everything it can to protect their privacy and the security of their data. Apple CEO Tim Cook […]

Rich Mogull on Apple Pay

Threatpost for B2B - Thu, 09/18/2014 - 08:22
Dennis Fisher talks with Rich Mogull about the new iPhone 6, the security and privacy of Apple Pay and whether there's another company that could put together a similar payment system.

Drupal Patches XSS Vulnerability in Spam Module

Threatpost for B2B - Wed, 09/17/2014 - 15:41
Drupal released an update that patches a moderately critical cross-site scripting vulnerability in its Mollom content and spam moderation module.

Apple Launches iOS 8, Fixes Dozens of Security Flaws

Threatpost for B2B - Wed, 09/17/2014 - 14:26
Apple has released iOS 8, a massive update to its mobile operating system, that includes fixes for more than 40 security vulnerabilities. Apple is touting iOS 8 as the biggest update to the software since it launched the App Store, and, aside from the security fixes, there are hundreds of new features and functions in […]

Series of Vulnerabilities Found in Schneider Electric SCADA Products

Threatpost for B2B - Wed, 09/17/2014 - 12:56
UPDATE–There are several unpatched, remotely exploitable vulnerabilities in a number of Schneider Electric’s SCADA products, one of which could be used to perform a shutdown of the SCADA server. Another of the vulnerabilities is an authentication bypass that could give an attacker access to sensitive data. The vulnerabilities affect a variety of Schneider Electric StruxureWare […]

POS Service Confirms Goodwill Breach Lasted 18 Months

Threatpost for B2B - Wed, 09/17/2014 - 12:11
Third-party payment vendor C&K Systems released details regarding a breach that affected its systems for 18 months and went on to affect customers who shopped at Goodwill.

FreeBSD Patches DoS Vulnerability

Threatpost for B2B - Wed, 09/17/2014 - 11:04
FreeBSD patched a vulnerability in the way the OS handles TCP packet processing that could lead to a denial-of-service attack on a server.

White House: Internet Not Borderless, But Lacking Interior

Threatpost for B2B - Wed, 09/17/2014 - 09:55
White House special assistant to the President and Cybersecurity Coordinator Micheal Daniel explains that a series of simple, known issues add up to a very difficult Internet security problem.

Government Requests for Google Data Up Again

Threatpost for B2B - Wed, 09/17/2014 - 08:43
Google's latest Transparency Report reveals government requests for data jumped 15 percent from the end of 2013, and that nine countries requested data for the first time.
Syndicate content