Threatpost for B2B
The First Stop For Security News
Updated: 20 hours 51 min ago
Apple finally has enabled two-factor authentication for its iCloud storage service, more than a year and a half after the company first turned the protective measure on for iTunes purchases and Apple ID.
A relatively new exploit kit that exploits old versions of Adobe Flash, Reader and, Silverlight has begun to make the rounds.
Adobe released a new version of Reader and Acrobat, patching eight security vulnerabilities in the PDF reader. The patches were delayed a weeks because of issues during regression testing.
The researcher who originally discovered the same-origin policy bypass in the Android browser said he reported the vulnerability to Google some time ago, but that the company’s Android security team said it was unable to reproduce the issue. Rafay Baloch said he first reported the vulnerability to Google on Aug. 13, informing the company’s Android […]
NSA Director and Commander of U.S. Cyber Command, Admiral Mike Rogers, urged listeners at the Billington Cybersecurity Summit that cyber-resilience should be the focus of network defense.
IBM reports a variant of the Citadel banking Trojan was spotted in APT-style targeted attacks against petrochemical companies in the Middle East.
Despite research published last year that demonstrated that Apple has the ability to decrypt users iMessages if it so chooses, Apple CEO Tim Cook said that the company does not hold the encryption key for those messages and couldn’t even produce the plaintext in response to a government order. In an interview on The Charlie […]
SNMP-based DDoS attacks spoofing Google's public recursive DNS server have been spotted by the SANS Internet Storm Center.
The United States Air Force is attempting to enhance its cyber situational awareness in order to contend with “increasingly sophisticated” threats to its networks and systems.
Comcast refutes reports that it is telling customers who use Tor that their service will be suspended or terminated.
There’s a serious vulnerability in pre-4.4 versions of Android that allows an attacker to read the contents of other tabs in a browser when a user visits a page the attacker controls. The flaw is present in a huge percentage of the Android devices in use right now, and there’s now a Metasploit module available […]
The makers of the popular IDA disassembly and debugging tool have fixed more than a dozen security vulnerabilities in a variety of versions. Some of the vulnerabilities are a couple of years old, and patches are provided for versions from 6.1 up through 6.6. IDA is a tool used by malware analysts, security researchers and […]
Four different remotely exploitable vulnerabilities were recently discovered and patched in a popular SCADA server.
A Brazilian political website has been compromised and is injecting iFrames that attempt to change the victim's router DNS settings.
During a long-running secret dispute between Yahoo and government officials over the constitutionality of orders from the federal government to turn over data belonging to Yahoo users, the company was facing fines of $250,000 for refusing to comply with the order. The revelation is contained in a cache of 1,500 pages of documents declassified by the […]
Dropbox revealed in its latest Transparency Report that 80 percent of the subpoenas it receives are accompanied by a request not to inform users their data is being requested.
Two Chinese cyber espionage campaigns are working in tandem in hopes of sniffing out trade secrets from surrounding nations.
US-CERT published an advisory warning of a denial-of-service vulnerability in Cisco's Integrated Management Controller; Cisco has already released an update patching the flaw.
A coalition of groups covering a wide swath of interests and political affiliations is banding together to call on Congress to address email privacy law.
A report from the UK's ICO says that permissions given to mobile apps often far exceed what's necessary, and that privacy policies are hardly apparent to users downloading apps.