Threatpost for B2B
The First Stop For Security News
Updated: 11 hours 46 min ago
Three federal agencies crucial to critical infrastructure protection will be allowed to continue to voluntarily assess cyber risk, rather than force the development and implementation of additional regulations.
Dennis Fisher and Mike Mimoso discuss the US indictments of Chinese army officers for hacking, the Blackshades malware arrests, the new IE 8 zero day and the US prospects in the World Cup.
Apple released an update to its Safari web browser that patches 22 vulnerabilities in the Webkit browser engine, including a number of remote code execution and denial of service vulnerabilities.
There are two issues with the way Microsoft’s Outlook application encrypts content on older versions of Android that could expose users’ emails and email attachments.
eBay did not enjoy its finest hour responding to and communicating about a breach of its password database.
UPDATE–Microsoft officials say they’re well aware of the Internet Explorer 8 zero day disclosed Wednesday by the Zero Day Initiative and have been working on a fix for it. However, there’s no stated timeline for releasing that patch. The vulnerability in IE 8 is a use-after-free bug in the way that the browser handles CMarkup […]
Adobe promises that its next Shockwave update will bring its bundled Flash Player patch levels up to date; in the meantime, Shockwave offers hackers a large attack surface to target.
Silent Circle has released a new version of its private text messaging and secure file transfer service for Android and iOS mobile devices.
Researchers at Cambridge University published a paper describing security vulnerabilities in the EMV chip-and-PIN protocol and implementation.
Samsung announced this week that to bolster security, it will incorporate biometric sensors such as iris scanners into more of its products in the near future.
Researchers have disclosed a new zero day vulnerability in Internet Explorer 8 that could enable an attacker to run arbitrary code on vulnerable machines via drive-by downloads or malicious attachments in email messages. The vulnerability was discovered and disclosed to Microsoft in October, but the company has yet to produce a patch, so HP’s Zero […]
Exploit vendor VUPEN disclosed details on a Firefox vulnerability it brought to this year's Pwn2Own contest. The bug was patched in March, one week after the contest.
eBay will ask customers to change their passwords today because of an attack that breached a server containing encrypted passwords and other information.
Attackers recently compromised a utility in the United States through an Internet-connected system that gave the attackers access to the utility’s internal control system network. The utility, which has not been named, had remote access enabled on some of its Internet-connected hosts and the systems were only protected by simple passwords. Officials at the ICS-CERT, […]
For all that gets written about how poorly organizations have responded to data breaches as of late, believe it or not, one new study has deduced that companies are getting better.
Google has fixed 23 security vulnerabilities in Chrome, including three high-risk flaws, and handed out $9,500 in rewards to researchers. Among the vulnerabilities that the company fixed in Chrome 35 are use-after-free flaws and an integer overflow, all of which are rated high. Google didn’t disclose the details of all of the various security vulnerabilities, […]
The results of a survey commissioned by Raytheon demonstrate that enterprises still don't have a firm grasp on privileged users and their activities on corporate networks.
That was quite a show the government put on Monday. The dramatic press conference featuring Attorney General Eric Holder, the coordinated press leaks ahead of the announcement, the strong statements about the sanctity of American commerce and how the United States will prosecute those who conduct cyberespionage against American targets. There were even cyber-wanted posters. […]
The FBI, Justice Department and law enforcement in 19 countries announced the takedown of the Blackshades operation, responsible for dissemination of the Blackshades RAT.
Beginning today, operators of instant massaging services that rely on the extensible messaging and presence protocol (XMPP) are expected to deploy encryption into the messaging platforms they maintain.