Feed aggregator

Apple CEO Defends iMessage Security

Threatpost for B2B - Tue, 09/16/2014 - 09:18
Despite research published last year that demonstrated that Apple has the ability to decrypt users iMessages if it so chooses, Apple CEO Tim Cook said that the company does not hold the encryption key for those messages and couldn’t even produce the plaintext in response to a government order. In an interview on The Charlie […]

SNMP DDoS Scans Spoof Google Public DNS Server

Threatpost for B2B - Mon, 09/15/2014 - 15:25
SNMP-based DDoS attacks spoofing Google's public recursive DNS server have been spotted by the SANS Internet Storm Center.

With MAMA, U.S. Air Force Aiming to Raise Cyber Awareness on Networks

Threatpost for B2B - Mon, 09/15/2014 - 14:35
The United States Air Force is attempting to enhance its cyber situational awareness in order to contend with “increasingly sophisticated” threats to its networks and systems.

Comcast Pushes Back Against Allegations it Will Cut Off Tor Users

Threatpost for B2B - Mon, 09/15/2014 - 13:19
Comcast refutes reports that it is telling customers who use Tor that their service will be suspended or terminated.

Flaw in Android Browser Allows Same Origin Policy Bypass

Threatpost for B2B - Mon, 09/15/2014 - 12:32
There’s a serious vulnerability in pre-4.4 versions of Android that allows an attacker to read the contents of other tabs in a browser when a user visits a page the attacker controls. The flaw is present in a huge percentage of the Android devices in use right now, and there’s now a Metasploit module available […]

Big Batch of Bugs Fixed in Various Versions of IDA

Threatpost for B2B - Mon, 09/15/2014 - 09:46
The makers of the popular IDA disassembly and debugging tool have fixed more than a dozen security vulnerabilities in a variety of versions. Some of the vulnerabilities are a couple of years old, and patches are provided for versions from 6.1 up through 6.6. IDA is a tool used by malware analysts, security researchers and […]

Four Vulnerabilities Patched in IntegraXor SCADA Server

Threatpost for B2B - Fri, 09/12/2014 - 12:22
Four different remotely exploitable vulnerabilities were recently discovered and patched in a popular SCADA server.

Hacked Brazilian Newspaper Site Targets Router DNS Settings

Threatpost for B2B - Fri, 09/12/2014 - 10:30
A Brazilian political website has been compromised and is injecting iFrames that attempt to change the victim's router DNS settings.

Documents in Long-Running Yahoo FISC Challenge Case Published

Threatpost for B2B - Fri, 09/12/2014 - 09:41
During a long-running secret dispute between Yahoo and government officials over the constitutionality of orders from the federal government to turn over data belonging to Yahoo users, the company was facing fines of $250,000 for refusing to comply with the order. The revelation is contained in a cache of 1,500 pages of documents declassified by the […]

Dropbox Reports 80 Percent of Subpoenas Contain Gag Request

Threatpost for B2B - Fri, 09/12/2014 - 08:52
Dropbox revealed in its latest Transparency Report that 80 percent of the subpoenas it receives are accompanied by a request not to inform users their data is being requested.

Chinese Hacking Groups Team Up Against Government, Military Systems

Threatpost for B2B - Thu, 09/11/2014 - 14:23
Two Chinese cyber espionage campaigns are working in tandem in hopes of sniffing out trade secrets from surrounding nations.

US-CERT Warns of Vulnerability in Cisco Baseboard Controller

Threatpost for B2B - Thu, 09/11/2014 - 14:21
US-CERT published an advisory warning of a denial-of-service vulnerability in Cisco's Integrated Management Controller; Cisco has already released an update patching the flaw.

Congress Urged to Update ECPA with Email Privacy Protection

Threatpost for B2B - Thu, 09/11/2014 - 12:24
A coalition of groups covering a wide swath of interests and political affiliations is banding together to call on Congress to address email privacy law.

Users in Dark about Permissions Granted to Mobile Apps

Threatpost for B2B - Thu, 09/11/2014 - 12:03
A report from the UK's ICO says that permissions given to mobile apps often far exceed what's necessary, and that privacy policies are hardly apparent to users downloading apps.
Syndicate content