Threatpost for B2B

Syndicate content
The First Stop For Security News
Updated: 1 hour 13 min ago

Adobe Patches Reader Zero Day Used in Targeted Attacks

Tue, 08/12/2014 - 11:44
Adobe released security updates for Reader, Acrobat and Flash Player. The Reader and Acrobat patches address a zero-day vulnerability being exploited in limited targeted attacks.

Authentication Bypass Bug Fixed in BlackBerry Z10

Tue, 08/12/2014 - 10:15
There's a remotely exploitable authentication bypass vulnerability in the BlackBerry Z10 phone that affects the service that lets users share files with machines on a wireless network. The bug could allow an attacker to steal users' personal data or hit them with targeted malware.

Fog Lifts on Rooted Blackphone Merry-Go-Round

Tue, 08/12/2014 - 08:40
Vulnerabilities in the secure Blackphone reported during DEF CON require unusual circumstances to exploit.

Millions of PCs Affected by Mysterious Computrace Backdoor

Mon, 08/11/2014 - 15:58
Absolute Software's anti-theft Computrace software is mysteriously installed on brand new machines, nearly impossible to remove, and exploitable.

Move Over Web Security, Embedded Devices Are Darling of Black Hat

Mon, 08/11/2014 - 12:07
Embedded device security emerged as front page news during the recently wrapped up Black Hat and DEF CON events.

Square Launches Bug Bounty, Hires Top Security Researcher

Mon, 08/11/2014 - 09:39
The bug bounty phenomenon began mainly with major software vendors and security companies, which were the main targets for security researchers and attackers. But it is now moving to virtually every corner of the Web and software ecosystem, and the latest company to join the party is Square, the mobile payment company. Square’s service allows […]

Google Moves to Boost Search Ranking For HTTPS Sites

Mon, 08/11/2014 - 08:49
In the last couple of years, Google has been making a series of changes to its Web infrastructure to employ encryption more widely and help defeat active attackers. Much of this has gone on in the background, with the company securing the links between its data centers and making other less-noticeable changes. But the most […]

Podcast: Black Hat News Wrap, Day Two

Fri, 08/08/2014 - 10:59
Podcasting day two of Black Hat, including a CryptoLocker working group, a medical device roundtable and overview of the various security and privacy improvements at Yahoo.

IE to Block Older ActiveX Controls, Starting with Java

Fri, 08/08/2014 - 10:55
Microsoft announced that it will block older ActiveX controls in Internet Explorer, starting with Java.

Podcast: Black Hat News Wrap

Thu, 08/07/2014 - 17:42
Dennis Fisher, Mike Mimoso and Brian Donohue discuss the news from day one of Black Hat, including the Dan Geer keynote, attacks on mobile broadband modems and carriers’ control of mobile phones. Download: Black-Hat-Day-One-Podcast.mp3 Music by Chris Gonsalves  

Connected Medical Devices Simultaneously Increase Risk and Safety

Thu, 08/07/2014 - 17:24
LAS VEGAS - It's widely known that embedded medical devices are hackable in dangerous ways, but the true risks to medical device are less well known.

Expert Warns of Chip-and-PIN Pitfalls

Thu, 08/07/2014 - 14:07
Cambridge University researcher Ross Anderson urged experts to take heed of weaknesses in chip-and-PIN payment cards as the inevitable switchover looms in the U.S.

Yahoo to Release End-to-End Encryption for Email Users

Thu, 08/07/2014 - 14:00
LAS VEGAS–Yahoo plans to enable end-to-end encryption for all of its Mail users next year. The company is working with Google on the project and the encryption will be mostly transparent for users, making it as simple as possible to use. Alex Stamos, CISO at Yahoo, said that the project has been a priority since […]

Behind the CryptoLocker Disruption

Thu, 08/07/2014 - 12:55
LAS VEGAS–The takedown of the GameOver Zeus malware operation in June got more than its share of attention, but it was the concurrent demolition of the CryptoLocker ransomware infrastructure that may prove to have been the most important part of the operation. That outcome was the culmination of months of behind the scenes work by […]

Podcast: Wendy Nather on the Black Hat Buzz

Thu, 08/07/2014 - 10:54
Dennis Fisher talks with Wendy Nather of 451 Research about the happenings on day one of Black Hat, the possibility of the US government disrupting the vulnerability market and software liability.​

Epic Operation Kicks Off Multistage Turla APT Campaign

Thu, 08/07/2014 - 09:00
Researchers at Kaspersky Lab have cracked the means by which the Turla APT campaign compromises its victims, using a precursor called Epic.

Legal Divide Between Security Research and Cybercrime Remains Murky

Thu, 08/07/2014 - 06:00
The line between criminal hacking and well-meaning security research is a thin, hazy one according to a panel discussion at Black Hat.

Oracle Database Redaction ‘Trivial to Bypass’

Wed, 08/06/2014 - 18:09
LAS VEGAS–David Litchfield for many years was one of the top bug hunters in the game and specialized in causing large-scale headaches for Oracle. When he decided to retire and go scuba diving, there likely were few tears shed in Redwood City. Litchfield recently decided to resurface, which is good news for the security community […]

Car Hacking Enters Remote Exploitation Phase

Wed, 08/06/2014 - 16:42
Researchers Charlie Miller and Chris Valasek today at Black Hat talked about their research on the remote attack surfaces present in popular automobiles.

Pervasive OTA Carrier Controls Exploitable on a Massive Scale

Wed, 08/06/2014 - 15:33
Las Vegas - Researchers at the Black Hat security conference claimed in a presentation that they can exploit pervasive carrier controls to wrest complete control of billions of consumer devices.