Threatpost for B2B

Syndicate content
The First Stop For Security News
Updated: 23 hours 23 min ago

Crouching Yeti APT Campaign Stretches Back Four Years

Thu, 07/31/2014 - 10:14
A new analysis of a long-term APT campaign targeting manufacturers, industrial, pharmaceutical, construction and IT companies in several countries has uncovered fresh details of the attack, including identification of nearly 3,000 victims and the unmasking of the command-and-control infrastructure.

Multipath TCP Introduces Security Blind Spot

Wed, 07/30/2014 - 14:50
A talk at Black Hat will expose security weaknesses introduced by multipath TCP, extensions to TCP that bring resilience and efficiency to networking.

ICS-CERT Warns of Flaw in Innominate mGuard Secure Cloud Product

Wed, 07/30/2014 - 14:36
The ICS-CERT is warning users about a vulnerability in a secure public cloud product from Innominate that enables an attacker to gain valuable configuration data about a target system, information that could be used in future attacks. The vulnerability is an information disclosure bug in the Innominate mGuard product, which is meant to connect operators to […]

Facebook Plans to Fix Instagram Mobile Session Hijack-Eventually

Wed, 07/30/2014 - 14:03
An encryption issue in the Android and iOS versions of the Instagram photo-sharing application could allow for man-in-the-middle attacks and more.

Canada’s National Research Council Hit by Apparent Chinese Cyber Attack

Wed, 07/30/2014 - 13:27
One of Canada’s premier research and technology organizations was hit with an apparent cyber-attack recently that forced the cooperative offline.

Tor Sniffs Out Attacks Trying to Deanonymize Hidden Services Users

Wed, 07/30/2014 - 10:11
Tor is warning users of its hidden services to upgrade relays after attackers were discovered on the network trying to deanonymize users.

Trio of Flaws Fixed in Facebook Android App

Wed, 07/30/2014 - 09:47
Facebook has fixed a vulnerability in its Android app could allow an attacker to cause a denial-of-service condition on a device or run up the victim’s mobile bill by transferring large amounts of data to and from the device. The flaw lies in the way that the Facebook app handles HTTP requests. The app include an HTTP server […]

Secure Microkernel seL4 Code Goes Open-Source

Wed, 07/30/2014 - 09:23
A new and allegedly super secure microkernel was made open source today, a move that could have serious security implications across a number sensitive and increasingly connected fields.

NOAA, Satellite Data, Fraught With Vulnerabilities

Tue, 07/29/2014 - 15:55
The informational systems that the National Oceanic and Atmospheric Administration (NOAA) runs are fraught with vulnerabilities and what the U.S. Department of Commerce deem “significant security deficiencies.”

New Signal App Brings Encrypted Calling to iPhone

Tue, 07/29/2014 - 14:56
Open WhisperSystems today released Signal, a free app that brings encrypted calling to the iPhone.

Leahy Introduces Bill to End Bulk Call Record Collection

Tue, 07/29/2014 - 14:51
Sen. Patrick Leahy has introduced an updated, tougher version of the USA FREEDOM Act that would end the bulk collection of data under Section 215 of FISA.

Threat Intelligence Tool Connects Dots on Pre-Attack Data

Tue, 07/29/2014 - 12:50
Georgia Tech Research Institute has released an open source threat intelligence gathering tool called BlackForest that automates attack-data mining.

Consumer Groups Urge FTC to Halt Facebook Data Collection Program

Tue, 07/29/2014 - 09:53
A collection of privacy and consumer groups from the United States and Europe has asked the Federal Trade Commission to force Facebook to suspend a recently installed program that mines information on sites that users' visit around the Web.

Critical Android FakeID Bug Allows Attackers to Impersonate Trusted Apps

Tue, 07/29/2014 - 08:00
There is a critical vulnerability in millions of Android devices that allows a malicious app to impersonate a trusted application in a transparent way.

Missile Defense Plans Hacked from Israeli Contractors

Mon, 07/28/2014 - 16:30
A new report claims attackers, apparently based in China, were able to hack into three Israeli defense firms to make off with sensitive military data in 2011.

DEF CON Hosting SOHO Wireless Router Hacking Contest

Mon, 07/28/2014 - 16:00
ISE will host a two-tracking hacking contest at DEF CON next week that focuses on the security of home and small office wireless routers.

Harnessing the Power of an Android Cluster for Security Research

Mon, 07/28/2014 - 14:20
When the topic of mobile security comes up, users and researchers often discuss Android as if it’s one monolithic operating system like iOS is. But the fact is that there are nearly as many versions of Android as there are Android devices, which has led to plenty of confusion when it’s time to fix a security […]

Koler Ransomware Infrastructure Complex and Agile

Mon, 07/28/2014 - 13:08
Researchers at Kaspersky Lab report on the infrastructure supporting the Koler ransomware, which not only has components targeting Android devices, but also redirects desktop browsers to other ransomware and exploit kits.

EFF Files Motion Asking Judge to Rule NSA Data Collection Unconstitutional

Mon, 07/28/2014 - 10:27
The EFF has asked a federal judge to rule that the NSA's collection of massive amounts of upstream user data is unconstitutional, violating the Fourth Amendment.

Siemens Patches Five Vulnerabilities in SIMATIC System

Fri, 07/25/2014 - 13:32
Siemens released an update for two builds of its SIMATIC automation system this week, addressing a quintet of issues, four of which are remotely exploitable.