-
November 25, 2013
Surveillance as a Business Model
Surveillance as a Business Model: Google recently announced that it would start including individual users’ names and photos in some ads. This means that if you rate some product positively, your friends may see ads for that product with your name and photo attached—without your knowledge or consent. Meanwhile, Facebook is eliminating a feature that […]
-
November 25, 2013
Google Account Recovery Vulnerability
Google Account Recovery Vulnerability: If I told you to think of the most sensitive features security-wise in a web application, you would probably say – Login. Well if your definition of “Login” does not include password recovery, then it would definitely be the second one. This means, that password recovery is often in the center […]
-
October 31, 2013
NSA, UK hacked Yahoo! and Google data center interconnects
NSA, UK hacked Yahoo! and Google data center interconnects: “We have long been concerned about the possibility of this kind of snooping, which is why we have continued to extend encryption across more and more Google services and links, especially the links in the slide,” Google’s chief legal officer, David Drummond, told the paper in […]
-
October 31, 2013
Adobe Hacking Attack Was Bigger Than Previously Thought
Adobe Hacking Attack Was Bigger Than Previously Thought: Earlier this month, Adobe said that hackers had gained access to credit card information and other personal data for 2.9 million of its customers. The company said hackers had also stolen an undisclosed number of Adobe usernames and encrypted passwords. On Tuesday, that tally of stolen usernames […]
-
October 31, 2013
Any iPhone can be hacked with a modified charger in under a minute
Any iPhone can be hacked with a modified charger in under a minute: The proof-of-concept charger has been dubbed “Mactans”, and is based on a BeagleBoard mini-computer. The BeagleBoard is a low-power open source hardware platform from Texas Instruments. It’s runs on an ARM Cortex-A8 and come as tiny 3-inch square board. It’s a bit […]
-
October 31, 2013
Crypto Locker Virus: Hackers Give Users 100 Hours to Pay Ransom for Malware Removal or Lose All Files
Crypto Locker Virus: Hackers Give Users 100 Hours to Pay Ransom for Malware Removal or Lose All Files: The Crypto Locker virus has been infecting thousands of computers across the country, with reports coming from across the world that the new malware virus has been infecting Windows PCs and holding users ransom. The malicious malware […]
-
October 31, 2013
DARPA Announces Cyber Grand Challenge
DARPA Announces Cyber Grand Challenge: First-of-its-kind cyber defense tournament seeks to drive automation revolution in information security What if computers had a “check engine” light that could indicate new, novel security problems? What if computers could go one step further and heal security problems before they happen? To find out, the Defense Advanced Research Projects […]
-
October 30, 2013
Robbing a bank? Carberp toolkit now available for just $5k
Robbing a bank? Carberp toolkit now available for just $5k: Cybercrooks are selling the source code for the Carberp banking Trojan toolkit through underground forums – at just $5,000 a pop. The sale of the building blocks for the banking Trojan toolkit is a sign of “conflict within the team”, according to Andrey Komarov of […]
-
October 30, 2013
More security flaws In Netgear, D-Link routers
More security flaws In Netgear, D: D-Link and Netgear wireless routers have come under attack from a security researcher who claims they are crippled by firmware flaws. Tripwire researcher Craig Young said that he was working with several manufacturers to patch firmware holes, though he didn’t say which companies. His comments come after a slew […]
-
October 30, 2013
British man charged with hacking US military networks
British man charged with hacking US military networks: A British man has been arrested in England and charged by the United States and Britain with hacking into US government computer systems, including those run by the military, to steal confidential data and disrupt operations, authorities said. Lauri Love and three co-conspirators allegedly infiltrated thousands of […]