Threatpost for B2B
The First Stop For Security News
Updated: 11 hours 1 min ago
The makers of the popular IDA disassembly and debugging tool have fixed more than a dozen security vulnerabilities in a variety of versions. Some of the vulnerabilities are a couple of years old, and patches are provided for versions from 6.1 up through 6.6. IDA is a tool used by malware analysts, security researchers and […]
Four different remotely exploitable vulnerabilities were recently discovered and patched in a popular SCADA server.
A Brazilian political website has been compromised and is injecting iFrames that attempt to change the victim's router DNS settings.
During a long-running secret dispute between Yahoo and government officials over the constitutionality of orders from the federal government to turn over data belonging to Yahoo users, the company was facing fines of $250,000 for refusing to comply with the order. The revelation is contained in a cache of 1,500 pages of documents declassified by the […]
Dropbox revealed in its latest Transparency Report that 80 percent of the subpoenas it receives are accompanied by a request not to inform users their data is being requested.
Two Chinese cyber espionage campaigns are working in tandem in hopes of sniffing out trade secrets from surrounding nations.
US-CERT published an advisory warning of a denial-of-service vulnerability in Cisco's Integrated Management Controller; Cisco has already released an update patching the flaw.
A coalition of groups covering a wide swath of interests and political affiliations is banding together to call on Congress to address email privacy law.
A report from the UK's ICO says that permissions given to mobile apps often far exceed what's necessary, and that privacy policies are hardly apparent to users downloading apps.
Crypto ransomware, a relatively unknown phenomenon a couple of years ago, has exploded into one of the nastier malware problems for Internet users. Variants such as CryptoLocker and CryptoWall have been siphoning money from victims for some time, and now researchers have dissected a newer variant known as TorrentLocker and found that the creators made […]
The University of Texas information security office disclosed details of a vulnerability in remote management software Webmin that could allow someone to remotely delete files on a host server.
Five million email addresses showed up on a Russian Bitcoin security forum last night. Most of the leaked addresses belong to Gmail users.
Some older versions of Apache Tomcat, the company’s open source web server and servlet container, are vulnerable to remote code execution.
A small segment of the security research community has been spending a lot of time tearing apart the innards of various vehicles and looking at ways that the computers and local networks that reside in modern cars can be hacked. There has been some remarkable success on this front, and while auto makers haven’t paid […]
Microsoft patched a disclosure leak in Internet Explorer that revealed whether EMET or other antimalware protections were running on a compromised computer.
Researchers from the University of New Haven have taken to Youtube this week to publicize vulnerabilities in a dozen Android apps, including Instagram, Vine and OKCupid.
Adobe announced security updates and a new version of Flash Player for Windows, Mac and Linux; the company also announced it was postponing a scheduled update for Reader and Acrobat.
In the days and weeks following the public disclosure of the OpenSSL Heartbleed vulnerability in April, security researchers and others wondered aloud whether there were some organizations–perhaps the NSA–that had known about the bug for some time and had been using it for targeted attacks. A definitive answer to that question may never come, but […]
When Mozilla released Firefox 32 last week, the company removed several root certificates from the trust store for the browser. The move wasn’t because the certificates were fraudulent or the CAs that issued them were compromised, but because the certificates use 1024-bit keys. This is the first step in a process that Mozilla officials say […]
Google has initiated a process to revoke trust from any certificates that rely on the outdated SHA-1crytpographic hash algorithm.