View RSS Feed

All Blog Entries

  1. Chrome password security issue stirs debate

    Click image for larger version. 

Name:	Chrome-logo-2011-03-16_270x269.jpg 
Views:	188 
Size:	8.5 KB 
ID:	78
    Another person with access to your computer can see your Google Chrome saved passwords through a simple series of steps. Should you be worried?

    The security flaw was highlighted in a blog posted Tuesday by software developer Elliot Kember. In his blog, Kember described how your saved passwords in Chrome can be revealed in plain text, a process that any Chrome user can replicate.

    In Chrome, click on the Settings icon, and then click on the ...
  2. Fort Disco botnet hackers bruteforce their way onto 25,000 Windows machines

    Click image for larger version. 

Name:	original.jpg 
Views:	211 
Size:	15.9 KB 
ID:	77
    A new bruteforce botnet campaign has infected over 25,000 Windows machines with malware using an unknown infection method, according to Arbor Networks.

    Arbor Networks security researcher Matthew Bing reported detecting the password-guessing campaign, codenamed Fort Disco, confirming it has already infected several popular web tools, including Joomla and WordPress.

    "We've identified six related command-and-control (C&C) sites that ...
    Categories
    apps
  3. Android malware is reaching critical mass warns Trend Micro

    Click image for larger version. 

Name:	android_sick_0.jpg 
Views:	431 
Size:	16.0 KB 
ID:	76
    Google's Android mobile operating system is so beset by cyber criminals creating malicious apps that the malware is on track to hit the million mark before the end of 2013, Trend Micro has warned.

    The news is in the security firm's second quarter Security Roundup Report, which reveals that the number of malicious Android apps surged by 350,000 in the first half of 2013, hitting a total of 718,000 by June this year.

    Trend Micro said that ...
  4. Twitter hardens two-factor authentication with app-based secure logins

    Click image for larger version. 

Name:	v65oai7fxn47qv9nectx.jpg 
Views:	164 
Size:	3.9 KB 
ID:	74
    Barely two months after rolling out two-factor authentication, Twitter has beefed up its login procedures yet again, both to improve security and to make two-factor available to more Twitter users worldwide.

    Twitter launched two-factor authentication in late May with a system based on SMS messaging. While that was good enough for many users, however, it did present some problems.

    For one thing, verification via SMS is only available via ...
  5. Android one-click Google authentication method puts users, businesses at risk

    Click image for larger version. 

Name:	Android-Claco-A-AndroidLogin.jpg 
Views:	243 
Size:	5.7 KB 
ID:	72
    The single-click Google account login for Android apps is a little too convenient for hackers, according to Tripwire's Craig Young, who has demonstrated a flaw in the authentication method.

    The mechanism is called “weblogin”, and basically it allows users to use their Google account credentials as authentication for third-party apps, without sharing the username and password itself: a token is generated to represent the user's login details.
    ...
  6. Windows Phones BLAB passwords to hackers, thanks to weak crypto

    Click image for larger version. 

Name:	WindowsPhone8X_Multi.jpg 
Views:	235 
Size:	81.1 KB 
ID:	71
    Rogue Wi-Fi hotspots can hoover up and CRACK encrypted login info

    Microsoft has warned IT departments to batten down their Wi-Fi networks following the discovery of a security vulnerability in Windows Phones that leaks users' passwords.

    Miscreants who set up rogue hotspots can grab from devices employees' encrypted domain credentials, needed to authenticate with corporate systems and access network resources. But the algorithm encrypting ...
  7. Feds Are Suspects in New Malware That Attacks Tor Anonymity

    Click image for larger version. 

Name:	structured_cabling_network_switch.jpg 
Views:	206 
Size:	30.3 KB 
ID:	70
    Security researchers tonight are poring over a piece of malicious software that takes advantage of a Firefox security vulnerability to identify some users of the privacy-protecting Tor anonymity network.

    The malware showed up Sunday morning on multiple websites hosted by the anonymous hosting company Freedom Hosting. That would normally be considered a blatantly criminal “drive-by” hack attack, but nobody’s calling in the FBI this time. The FBI is the ...
  8. Hacking RFID Tags Is Easier Than You Think

    Click image for larger version. 

Name:	rfid-technology.jpg 
Views:	203 
Size:	15.2 KB 
ID:	69
    You know all those security badges people use to get into buildings? Many of them are hackable, according to Francis Brown, an executive at Bishop Fox.

    LAS VEGAS—Radio-frequency identification tags are widely deployed around the world and commonly used for building security system cards. As it turns out, those RFID security cards might not be all that secure.

    That is the conclusion of Francis Brown, managing partner at security firm Bishop ...
  9. Sim card flaws leave millions of mobile phones open to attack

    Click image for larger version. 

Name:	Interview-Karsten-Nohl-Mifare-Classic-researcher-speaks-up-Karsten_1_high_res_1.jpg 
Views:	151 
Size:	49.1 KB 
ID:	68
    If you thought government analysts intercepting your phone's metadata was bad, here is something potentially more frightening: cyber crooks hijacking your phone to eavesdrop, impersonate you and ransack your accounts.

    A German cryptographer says he has discovered encryption and software flaws in hundreds of millions of phones, leaving them vulnerable to attack. Karsten Nohl revealed his findings fully and publicly for the first time at the Black Hat ...
  10. House Fails to Repeal NSA’s Dragnet Phone Surveillance Authority

    Click image for larger version. 

Name:	amash.jpg 
Views:	205 
Size:	57.6 KB 
ID:	67
    The House today narrowly defeated an amendment to a defense spending package that would have repealed authorization for the National Security Agency’s dragnet collection of phone-call metadata in the United States.

    The amendment to the roughly $600 billion Department of Defense Appropriations Act of 2014 would have ended authority for the once-secret spy program the White House insists is necessary to protect national security.

    The amendment ...
Page 3 of 7 FirstFirst 12345 ... LastLast