Threatpost for B2B
The First Stop For Security News
Updated: 10 hours 47 min ago
Linksys router contains an authentication bypass vulnerability that could give an attacker full administrative privileges on affected devices.
There is a new, remotely exploitable vulnerability in OpenSSL that could enable an attacker to intercept and decrypt traffic between vulnerable clients and servers.
A SCADA vulnerability could trigger a denial of service condition and go on to compromise the software’s communication connections, resulting in system instability is left unpatched.
DARPA announced that the finale of the Cyber Grand Challenge will be held during DEF CON 2016. More than 30 teams have signed up to build the best automated network defense system.
The past year has seen a tremendous amount of change and turbulence in the security and privacy communities, much of it related to the NSA surveillance revelations. One of the things that has come out of all of the discussions and debates is a greater focus on the importance of encryption, especially encrypting email and […]
Google has released an early version of a Chrome extension that provides end-to-end encryption for data leaving the browser. The extension will allow users to encrypt emails from their webmail accounts.
The National Institute of Standards and Technology is seeking comments from the public on it's latest cryptographic hash function, SHA-3.
A popular WordPress plugin could leave potentially millions of websites vulnerable if left unpatched.
Open source cryptographic library GnuTLS recently patched a remote code execution and denial of service vulnerability.
The effect of the takedown of the GameOver Zeus botnet this week has been immediate and significant. Researchers who track the activity of the peer-to-peer botnet's activity say that the volume of packets being sent out by infected machines has dropped to almost zero.
Malware capable of infecting point-of-sale devices once was a novelty, but it’s quickly becoming more common. Researchers at Arbor Networks have unearthed a new strain of PoS malware called Soraya that can scrape memory and has the ability to intercept information sent from Web forms, a specialty of the Zeus malware family. Soraya also has […]
The Heartbleed OpenSSL vulnerability can be exploited over wireless networks, according to a researcher who released PoC code for attacks against wireless authentication programs hostapd and wpa_supplicant.
Dennis Fisher talks with Joe "Kingpin" Grand about his childhood taking apart early PCs and radios, his introduction to the BBS and early phreaking and hacking scene in Boston, his involvement with the L0pht, @stake and now his current life as an engineer running Grand Idea Studios.
Organizers of the TrueCrypt audit say they hope to crowdsource some of the cryptanalysis slated for phase two.
UPDATE–Law enforcement agencies in Europe and the United States, including Europol and the FBI, ran a coordinated takedown of the GameOver Zeus botnet on Friday, seizing servers and disrupting the botnet’s operation. Authorities say that the same botnet has been used to distribute the CryptoLocker ransomware and they’re now looking for a 30-year-old Russian whom […]
Time flies when you’re having fun. But it apparently also flies when there’s a new story every other day about NSA surveillance. It’s been nearly one year since the first story sourced from the documents Edward Snowden stole from the agency appeared, and with that in mind, the EFF is encouraging people to commemorate the […]
Those in control of the Asprox botnet are hiding their malware in emails purporting to come from the USPS.
Google took steps toward compliance with a European privacy ruling that allows individuals to request their names be removed from search results.
Apache recently patched denial of service and information disclosure vulnerabilities in its Tomcat web server.
Monsanto has disclosed a data breach that involved the personal information of customers and employees of its Precision Planting subsidiary.