Threatpost for B2B
The First Stop For Security News
Updated: 14 hours 15 min ago
Mike Mimoso and Dennis Fisher talk about the Windows Schannel vulnerability and whether it's ripe for mass exploitation, as well as the WireLurker attack and why Apple hasn't addressed it.
Microsoft is considering adding public-key pinning–an important defense against man-in-the-middle attacks–to Internet Explorer. The feature is designed to help protect users against the types of MITM attacks that rely on forged certificates, which comprise a large portion of those attacks. Attackers use forged or stolen certificates to trick victims’ browsers into trusting a malicious site […]
The Senate will vote on the USA Freedom Act, a bill aimed at limiting the NSA surveillance and spying dragnet, in this lame-duck session of Congress.
Researchers successfully took down Apple and Samsung mobile phones using NFC hacks during Mobile Pwn2Own, but were not able to complete compromise Windows Phone or Nexus 5 running Android.
Systems belonging to the National Oceanic and Atmospheric Administration (NOAA) were recently compromised, purportedly by Chinese hackers.
Researchers have published a paper that describes an Internet voting hack that alters PDF ballots in transmission.
Several automakers have agreed on a set of privacy principles that they say will govern the way that they handle personal information generated by vehicles, geolocation data and other sensitive information that is being produced by in-car computers and networks.
The Electronic Frontier Foundation has backed VPN provider Golden Frog's FCC filing that accuses ISPs of stripping out STARTTLS instructions from email messages.
The critical vulnerability in the Schannel technology in Windows that Microsoft patched Tuesday is ripe for exploitation, experts say, and continues the long line of severe vulnerabilities in major SSL/TLS implementations in recent months.
Retail trade groups are urging Congress to pass a law that would enforce data breach notification rules uniformly across industries without exemption.
Adobe pushed out security updates for Flash Player this afternoon, addressing 18 different vulnerabilities, all critical, that could allow an attacker to take control of an affected system.
Microsoft patched a zero-day vulnerability in OLE being used in targeted attacks as part of its November 2014 Patch Tuesday security bulletins, one of four critical updates released today.
The United States Postal Service is continuing its investigation into how a cyber attack at the agency managed to compromise both employees and customers earlier this year.
Researchers at Kaspersky Lab published a report identifying by name the first five victims of Stuxnet.
Tor said it wasn't clear how or why the Tor Hidden Services were seized but that it was still trying to learn more in the wake of the digital sting.
Researchers at FireEye disclosed Masque, a vulnerability in iOS that enabled the WireLurker attacks. It was reported in July, but has yet to be patched by Apple.
Mozilla is starting a new initiative that the company says is designed to incorporate more privacy enhancing features into Firefox and the other Mozilla products. The project, known as Polaris, involves collaboration with The Tor Project and the Center for Democracy and Technology and will involve Mozilla running a group of high-speed Tor relays, as […]
Five vulnerabilities were patched in the most recent update to the open source Pidgin instant messaging client.
APT groups tend to be grouped together in a large amorphous blob of sinister intentions and similar targets, but not all APT crews are created equal. Researchers have identified a group that’s been operating in Asia for at least seven years and has been using hotel networks as key infection points to target top executives at […]
LAS VEGAS–Nick Percoco has been thinking a lot about the future of technology, and some of the things he’s dreamed up aren’t very pretty: farms of people renting out their spare brain cycles, autonomous cars that freak out and careen into oncoming traffic and hacking groups hijacking users’ augmented reality gear and demanding ransoms to unlock […]