October 13, 2016
Via: Security IntelligenceEthics — moral principles that govern a person’s behavior — is a critical part of any sound cyber-security defense strategy. Without clear ethical standards and rules, cyber-security professionals are almost indistinguishable from the black-hat criminals against whom they seek to […]
October 6, 2016
Via: InfoWorldWith the U.S. presidential election just weeks away, questions about election security continue to dog the nation’s voting system. It’s too late for election officials to make major improvements, “and there are no resources,” said Joe Kiniry, a long-time election […]
October 3, 2016
Via: Security AffairsLaw enforcement and intelligence agencies dedicate an important commitment in the fight of illegal activities in the Dark Web where threat actors operate in a condition of pseudo-anonymity. A group of security researchers at the Princeton University, Karlstad University and KTH Royal […]
September 19, 2016
Via: InfoSecurity LiveKaspersky Lab researchers examined a number of digital kiosks and interactive terminals used in modern cities for different purposes – from paying for different services through to entertainment – and discovered that a lot of them contain vulnerabilities that can […]
August 26, 2016
Via: SC MagazineResearchers across three universities have discovered seven classes of vulnerabilities in the sandboxing feature of Apple’s iOS operating system, which if exploited could allow malicious actors to launch a bevy of attacks that would place an iPhone or iPad user’s […]
August 18, 2016
Via: Kaspersky BlogThe banking industry spends a lot of effort, time, and money to protect bank cards. For years, their protection consisted of embossed digits and a signature field, but now smart chips and one-time passwords stand guard between your money and […]
August 12, 2016
Via: Security WeekResearchers have disclosed two remote keyless system attack methods that can be exploited by thieves to clone entry remotes and unlock millions of cars worldwide. The fact that various functions of a moving car can be hijacked by a hacker […]
August 11, 2016
Via: The HillResearchers who uncovered a security key that protects Windows devices as they boot up say their discovery is proof that encryption backdoors do not work. The pair of researchers, credited by their hacker nicknames MY123 and Slipstream, found the cryptographic […]
August 4, 2016
Via: Security WeekMalware operators can hide the use of malicious macros to distribute malware by simply renaming the offending Office documents, Cisco researchers reveal. Microsoft switched macros off by default in 2007, and also introduced new file formats that no longer supported […]
Vulnerabilities, Wireless security
July 27, 2016
Via: Help Net SecurityResearcher Gergely Eberhardt with Hungarian security testing outfit SEARCH Laboratory has unearthed over fifty vulnerabilities in five home gateway modems/routers used by Hungarian Cable TV operator UPC Magyarország, but also by many ISPs around the world. The devices in question […]
Cyber warfare, Mobile security
July 21, 2016
Via: Help Net SecurityThere has never been a more interesting or daunting time to be in security. We have the proliferation of connected devices and a digitally connected global economy, colliding with nation-state threat actors and concerns over consumer privacy. All of these […]
July 15, 2016
Via: Help Net SecurityA group of researchers from MIT and the Swiss Federal Institute of Technology in Lausanne have come up with a new anonymity system that is both bandwidth and computation efficient, as well as less susceptible to traffic analysis attacks than […]
Access control, Hacker, Mobile security
July 12, 2016
Via: Help Net SecurityA group of researchers from Georgetown University and UC Berkeley have demonstrated how voice commands hidden in YouTube videos can be used by malicious attackers to compromise smartphones. In order for the attack to work, the target smartphones have to […]
Network security, Privacy protection
July 12, 2016
Via: The HillResearchers have developed a network architecture they claim is a dramatically more efficient way for users to interact anonymously. Researchers from the Massachusetts Institute of Technology and the Swiss École Polytechnique Fédérale de Lausanne collaborated on the project, known as “Riffle […]
June 27, 2016
Via: Help Net SecurityFor the last few years, researchers from Ben-Gurion University of the Negev have been testing up new ways to exfiltrate data from air-gapped computers: via mobile phones, using radio frequencies (“AirHopper”); using heat (“BitWhisper”), using rogue software (“GSMem”) that modulates […]
June 24, 2016
Via: Dark ReadingThe Necurs botnet associated with Dridex and Locky is back after three-week haitus. A botnet associated with the huge volumes of Dridex and Locky-laden emails in recent months has resumed operations after mysteriously going dark for three weeks. Researchers from […]
May 31, 2016
Via: Security WeekSafeBreach researchers set out in 2015 to find the perfect method for stealing small amounts of sensitive data from highly secure organizations. While malicious actors often exfiltrate gigabytes of files from the companies they breach, key pieces of information can […]
February 26, 2016
Via: Dark ReadingAll that is needed to gain access to any LEAF’s telematics system is the car’s VIN, researcher says. Automaker Nissan Motor Company has temporarily disabled a remote telematics system in its LEAF electric vehicles after a security researcher showed how […]
February 9, 2016
Via: SC MagazinePalo Alto Networks researchers spotted a new, more complex backdoor trojan that is targeting Skype users, and which can identify and evade the security software found on the victim’s computer. Palo Alto’s Josh Grunzweig and Jen Miller-Osborn, part of the […]
February 4, 2016
Via: Help Net SecurityRapid7 researchers have unearthed serious flaws in two Internet of Things devices: The Fisher-Price Smart Toy, a “stuffed animal” type of toy that can interact with children and can be monitored via a mobile app and WiFi connectivity, and The […]