Threatpost for B2B
The First Stop For Security News
Updated: 4 hours 34 min ago
Samsung has answered a researcher's critique of alleged encryption and password weaknesses in early version of its Knox technology on Galaxy and Note devices.
A research report claims that Samsung's Knox containers store PIN data in clear text. The report comes shortly after the NSA endorsed Galaxy devices for agency use.
A security researcher has identified a Tor exit node that was actively patching binaries users download, adding malware to the files dynamically. The discovery, experts say, highlights the danger of trusting files downloaded from unknown sources and the potential for attackers to abuse the trust users have in Tor and similar services. Josh Pitts of Leviathan […]
A new SMTP header developed by Facebook and Yahoo confirms ownership of Yahoo email accounts.
More than 1 million SOHO routers and embedded devices are vulnerable to a serious vulnerability in the NAT-PMP protocol that enables traffic hijacking and denial of service attacks.
Attackers have been leveraging the FlashPack Exploit Kit to peddle CryptoWall 2.0 ransomware on unsuspecting visitors to sites like Yahoo, The Atlantic and AOL.
A D.C. insider is pessimistic that we'll see cybersecurity legislation before 2016, pointing toward a number on contributing political and national security factors.
There is a severe remote code execution vulnerability in a number of Cisco's security appliances, a bug that was first disclosed nearly three years ago.
A catastrophic failure in the emergency call management infrastructure cascaded into an incident that left 11 million out of reach of 911 dispatchers for six hours.
A week-old Adobe Flash Player vulnerability has already been integrated into the Angler and Fiesta exploit kits, researcher Kafeine discovered.
NIST this week published a draft document SP800-125a that makes recommendations for hypervisor security in virtualized environments based on architectural platform choices and configuration options.
Developers at PHP recently patched a bug that can lead to a heap-based buffer overflow and remote code execution.
Attackers are using a zero day vulnerability in nearly all supported versions of Windows in a series of targeted attacks.
Former NSA general counsel Stewart Baker shared his insight on Washington's perceptions of cyberwar during his keynote address at the Cybersecurity Summit in Minneapolis.
The FTC has hired Ashkan Soltani, a highly regarded and respected technologist and privacy researcher, as its chief technologist. The move is the latest in a string of interesting hires by the Federal Trade Commission. In 2009 the agency hired Chris Soghoian, a privacy and security researcher, as its first in-house principal technologist. Soghoian had […]
The office supply chain Staples is reportedly looking into a payment data card breach, potentially making it the latest in a long line of retail establishments to suffer a compromise over the last year.
Google is introducing an improved two-factor authentication system for Gmail and its other services that uses a tiny hardware token that will only work on legitimate Google sites. The new Security Key system is meant to help defeat attacks that rely on highly plausible fake sites that are designed to capture users’ credentials. Attackers often go […]
The Obama administration has issued an executive order aimed at speeding up the adoption of chip and PIN or EMV payment systems here in the United States.
The FBI has long said that the use of strong encryption software hampers the bureau’s investigations and makes life easier for criminals. Current FBI Director James Comey continued this line of reasoning in a speech on Oct. 17, saying that the use of crypto could lead the country to a dark place, and the EFF […]
Apple has fixed a huge number of security vulnerabilities in OS X and iTunes and, at the same time, is being hit with criticisms about privacy issues in the new version of OS X. The latest version of the operating system, known as Yosemite, sends location information to Apple by default via the Spotlight search […]