View RSS Feed

Recent Blogs Posts

  1. Thieves allegedly install keyloggers to capture credit cards at Nordstrom

    Click image for larger version. 

Name:	nordstromsskimmer.jpg 
Views:	936 
Size:	11.0 KB 
ID:	98
    A trio of men may have installed keyloggers at a Nordstrom department store in Florida to skim credit card numbers, reports KrebsOnSecurity. According to a police report, the men plugged standard keyloggers into the backs of cash registers and returned to remove them some days later with the alleged intent to use the information to create fake credit cards.

    The keyloggers the thieves used imitate the look and design of PS/2 keyboard connectors, priced ...
  2. Google Play cracks down on scammers and spammers

    Click image for larger version. 

Name:	google-play-logo1.jpg 
Views:	688 
Size:	25.9 KB 
ID:	92
    Google Play has updated its content policy to tighten its rules around in-app advertising, in-app payments and misrepresentation.

    Google Play's relatively lax content policy has led to a few problems that can make the consumer experience very annoying: relentless pop-ups, bloated software, fake reviews to make an app seem better than it is and misleading app descriptions.

    Google has sent an email to third-party developers announcing changes ...
    devices , apps , mobile , andriod
  3. Android malware is reaching critical mass warns Trend Micro

    Click image for larger version. 

Name:	android_sick_0.jpg 
Views:	448 
Size:	16.0 KB 
ID:	76
    Google's Android mobile operating system is so beset by cyber criminals creating malicious apps that the malware is on track to hit the million mark before the end of 2013, Trend Micro has warned.

    The news is in the security firm's second quarter Security Roundup Report, which reveals that the number of malicious Android apps surged by 350,000 in the first half of 2013, hitting a total of 718,000 by June this year.

    Trend Micro said that ...
  4. Hacking RFID Tags Is Easier Than You Think

    Click image for larger version. 

Name:	rfid-technology.jpg 
Views:	212 
Size:	15.2 KB 
ID:	69
    You know all those security badges people use to get into buildings? Many of them are hackable, according to Francis Brown, an executive at Bishop Fox.

    LAS VEGAS—Radio-frequency identification tags are widely deployed around the world and commonly used for building security system cards. As it turns out, those RFID security cards might not be all that secure.

    That is the conclusion of Francis Brown, managing partner at security firm Bishop ...
  5. House Fails to Repeal NSA’s Dragnet Phone Surveillance Authority

    Click image for larger version. 

Name:	amash.jpg 
Views:	212 
Size:	57.6 KB 
ID:	67
    The House today narrowly defeated an amendment to a defense spending package that would have repealed authorization for the National Security Agency’s dragnet collection of phone-call metadata in the United States.

    The amendment to the roughly $600 billion Department of Defense Appropriations Act of 2014 would have ended authority for the once-secret spy program the White House insists is necessary to protect national security.

    The amendment ...
  6. Hackers take advantage of Java flaws

    Click image for larger version. 

Name:	java.jpg 
Views:	192 
Size:	6.4 KB 
ID:	65
    Most enterprise networks are riddled with vulnerable Java installations, according to a new study whose release coincides with the discovery of another 0-day Java flaw.

    Less than one per cent of organisations are running the latest version of Java, according to a study by security software firm Bit9. The most frequently encountered version of Java running on endpoints is version 6 update 20, found on 9 per cent of systems and subject to 96 high-severity ...
  7. Google patches 'Master Key' Android hole, already on its way to Samsungs

    Click image for larger version. 

Name:	google-logo-18711-370x229.jpg 
Views:	278 
Size:	14.7 KB 
ID:	62
    The sky was falling last week when it emerged that there was a major security hole that could mean 900 million Android devices could be vulnerable to hack attacks - but Google has now rolled out a patch.

    It was quite a dramatic state of affairs, with security firm Bluebox reckoning that 99 per cent of Android handsets were vulnerable - there was the potential for nefarious devs to modify app update code.

    Full Article

    devices , mobile , andriod
  8. Facebook instigates secure-by-default surfing for users

    Click image for larger version. 

Name:	images (2).jpg 
Views:	330 
Size:	2.8 KB 
ID:	51

    Facebook has started to make HTTPS the default protocol for all its webpages.

    Previously, Facebook users had the option to make HTTPS the default protocol for connecting to the social networking site. Last year, Facebook announced its plans to roll out default HTTPS encryption, following the example of companies such as Twitter.

    Full article available at V3.
    apps , mobile
  9. Physical Drive By Downloads

    Mobile security is still a fairly young practice, but it’s not unexplored. Over the past few years, there has been plenty of research on mobile threats, such as exploits, malicious applications, and more recently, drive-by downloads. However, there is at least one aspect of security that is lacking documentation, and that is the physical security of the device. One of Android’s great selling points, customization, is also one of its weakest ...