Threatpost for B2B

Syndicate content
The First Stop For Security News
Updated: 5 hours 58 min ago

Mozilla Latest to Part Ways With SHA-1

Wed, 09/24/2014 - 10:30
Mozilla announced that it will begin phasing out support for SHA-1 certificates, and will no longer trust them after Jan. 1, 2017.

Microsoft Starts Online Services Bug Bounty

Tue, 09/23/2014 - 14:52
Microsoft today launched the Microsoft Online Services Bug Bounty Program which will pay out a minimum of $500 for vulnerabilities found in its cloud services such as Office 365.

High-Volume, High-Rate DDoS Attacks Persist

Tue, 09/23/2014 - 14:12
A new report illustrates the continued proliferation of both high-volume and high-rate distributed denial of service attacks, like the ones executed via NTP amplification, over the last few months.

JQuery Website Redirecting to RIG Exploit Kit

Tue, 09/23/2014 - 14:01
jQuery.com, website for the popular jQuery JavaScript library, is redirecting visitors to a site hosting the RIG exploit kit, security company RiskIQ said.

Blackphone Gets Bug Bounty Program Off Ground

Tue, 09/23/2014 - 11:10
Secure smartphone manufacturer Blackphone announced today that it has launched a bug bounty program hosted on the Bugcrowd platform.

Malware-Laced Emails Appear to Come From LogMeIn

Tue, 09/23/2014 - 10:10
Spam emails pretending to be a security update for LogMeIn users, including a new security certificate countering Heartbleed attacks, are making the rounds, warns the SANS Institute.

Charney on Trustworthy Computing: ‘I Was the Architect of These Changes’

Tue, 09/23/2014 - 07:53
Scott Charney, the head of Microsoft’s Trustworthy Computing efforts, said that he was the one who decided it was time to move the TwC group in a new direction and integrate the security functions more deeply into the company as a whole. “I was the architect of these changes. This is not about the company’s […]

Researcher Discloses Wi-Fi Thermostat Vulnerabilities

Mon, 09/22/2014 - 14:14
Digital thermostat maker Heatmiser is in the process of contacting its customers about a series of security issues that could open a Wi-Fi connected version of its product to takeover.

Kyle and Stan Malvertising Network Nine Times Bigger Than First Reported

Mon, 09/22/2014 - 13:11
The Kyle and Stan malvertising network has compromised more than nine times as many domains as originally reported two weeks ago.

Fitness App Patches Privacy Vulnerability

Mon, 09/22/2014 - 11:04
Details of a patched privacy vulnerability in MyFitnessPal, a popular fitness and nutrition mobile application, were disclosed this week, three months after a fix was deployed.

Productivity Gains Trumping Security as BYOD Grows

Mon, 09/22/2014 - 07:00
A new study from Raytheon and the Ponemon Institute paints a grim picture for BYOD security, but one expert sees some straightforward solutions to implementing BYOD securely.

New Research Refines Security Vulnerability Metrics

Fri, 09/19/2014 - 13:23
Research from the University of Maryland proposes new security metrics that can help enterprises understand risks to their products and prioritize patching and vulnerability management.

Threatpost News Wrap, September 19, 2014

Fri, 09/19/2014 - 11:19
Dennis Fisher and Mike Mimoso talk abut the crazy news of the last couple of weeks, the Apple privacy and Apple Pay announcements, the details of the Home Depot breach and the end of the Microsoft Trustworthy Computing unit.

Era Ends With Break Up of Trustworthy Computing Group at Microsoft

Fri, 09/19/2014 - 10:43
In a move that has surprised many in the security community, Microsoft has disbanded its Trustworthy Computing unit, the group that was responsible for the pioneering work that helped reverse the company’s security reputation and make Windows a much more secure and reliable computing platform. The end of the TwC group comes as Microsoft is in […]

56 Million Payment Cards At Risk in Home Depot Data Breach

Thu, 09/18/2014 - 16:46
The Home Depot data breach put 56 million payment cards at risk, the company said today, adding that the attackers used custom malware in the breach.

OWASP Releases Latest App Sec Guide

Thu, 09/18/2014 - 13:24
OWASP published the latest iteration of its Testing Guide, an informational manual designed to teach developers how to build and maintain secure application.

CVE Identifiers Make Room For a Few More Digits

Thu, 09/18/2014 - 12:37
The deadline for a syntax change for CVE identifiers is coming on Jan. 13 when the four-digit format will support five or more. Vendors must update vulnerability management products to support the new syntax.

Chinese Penetrate TRANSCOM Amid Lack of Data Sharing

Thu, 09/18/2014 - 11:18
TRANSCOM, the Defense Department command that handles wartime military logistics was compromised repeatedly over a one-year span by a handful of Chinese APT groups.

New Initiative Simply Secure Aims to Make Security Tools Easier to Use

Thu, 09/18/2014 - 10:43
The dramatic revelations of large-scale government surveillance and deep penetration of the Internet by intelligence services and other adversaries have increased the interest of the general public in tools such as encryption software, anonymity services and others that previously were mainly of interest to technophiles and activists. But many of those tools are difficult to use […]

Dyre Trojan Caught In The Cookie Jar

Thu, 09/18/2014 - 09:57
Researchers at Adallom analyzed a sample of the Dyre banking Trojan that was found to be targeting Salesforce.com credentials.