Threatpost for B2B
The First Stop For Security News
Updated: 23 hours 34 min ago
A handful of bugs, mostly XSS and CSRF vulnerabilities, have been plaguing at least eight different Wordpress plugins as of late.
Twitter is the latest major Internet company to establish a bug bounty program, and has put no upper limit on the bounty that a researcher can earn for reporting a vulnerability. The company announced on Wednesday that it will operate its bounty program through the HackerOne platform, a bug bounty system that enables vendors to […]
Home Depot is telling customers to closely monitor bank and credit card accounts for fraud as it continues to investigate what could be a massive data breach.
Mozilla has released Firefox 32, the latest version of its browser, which now supports public-key pinning and also includes fixes for several critical security vulnerabilities. The move to support public-key pinning is an important one for Firefox, as it helps protect users against man-in-the-middle attacks that rely on forged certificates. The feature binds a set […]
Dennis Fisher talks with Gary McGraw of Cigital about the IEEE's new Center for Secure Design program, the difficulty of defeating large classes of bugs and the collaborative effort it will take to solve the software security problem.
Home Depot has brought in law enforcement and banking partners to investigate a possible data breach after credit cards reportedly stolen from the retailer appeared on an underground carder forum.
A new watering hole attack is targeting the aerospace, automotive and manufacturing industries with a new reconnaissance malware tool called "Scanbox."
A researcher discovered an issue with the random generation of WPS keys in a number of unnamed routers that could allow an attacker to guess the key in one try.
UPDATE–Apple has patched the vulnerability in its Find My iPhone app that likely was used in the attack that led to the publication of private photos belonging to dozens of celebrities over the weekend. The victims of the breach included actors, models and athletes such as Jennifer Lawrence and Kate Upton. The photos have appeared […]
Dennis Fisher talks with Robert Hansen of WhiteHat Security about the company's decision to change default search providers to Disconnect and the $250,000 guarantee for users of the Sentinel Elite product.
A new analysis of sinkholes Backoff point-of-sale malware paints a bleak picture of the state of point-of-sale security.
The CryptoWall ransomware has proven to be a profitable criminal enterprise, netting more than $1.1 million in six months. More than 1,600 victims have surfaced and more than 5 billion files have been encrypted.
Mozilla is planning to add support for public-key pinning in its Firefox browser in an upcoming version. In version 32, which would be the next stable version of the browser, Firefox will have key pins for a long list of sites, including many of Mozilla’s own sites, all of the sites pinned in Google Chrome […]
The email addresses and encrypted passwords of nearly 100,000 users of Mozilla’s Bugzilla system were left on a publicly accessible server for several months earlier this year, the company said. The disclosure comes just a few weeks after Mozilla advised members of its Mozilla Developer Network to change their passwords because of a similar incident. On […]
The IEEE's Center for Secure Design's new guidance for software architects called "Avoiding the Top 10 Software Security Design Flaws" debuted this week.
GameOver Zeus and Sality banking malware infections are rampant in emerging countries such as Turkey where older, unpatched computers are prevalent, and security awareness is low.
Microsoft re-released MS14-045 today two weeks after pulling it from Windows Update because the patch was causing system crashes and blue screens of death.
Verizon announced Tuesday it will soon begin using QR codes to allow users to log in to sites and programs in its Universal Identity Services portfolio.
Popular websites TMZ and Java.com are among a handful serving malicious ads redirecting visitors to the Angler Exploit Kit.
The 2014 IBM X-Force Threat Intelligence Quarterly takes a look back at Heartbleed and how organizations were affected by it.