In two separate presentations at Def Con in Las Vegas last weekend, security experts demonstrated vulnerabilities in two consumer drones from Parrot. The simplest of the attacks could make Parrot drones, including the company's Bebop model, fall from the sky with a keystroke.
Two-factor authentication is a great way to keep your online accounts safe. For those who are unfamiliar with two-factor authentication, basically what happens is that when you enter your regular password into the login page, you will then be prompted to enter another code. This code is generated on the spot and sent to your associated mobile device.
Oracle security chief: Please comply with your license agreement and stop reverse engineering our code
Oracle's chief security officer is tired of customers performing their own security tests on Oracle software, and she's not going to take it anymore. That was the message of a post she made to her corporate blog on August 10—a post that has since been taken down.
When Der Spiegel and Jacob Appelbaum published leaked pages of the National Security Agency's ANT Catalog—the collection of tools and software created for NSA's Tailored Access Operations (TAO) division—it triggered shock, awe, and a range of other emotions around the world. Among some hardware hackers and security researchers, it triggered something else, too—a desire to replicate the capabilities of TAO's toolbox to conduct research on how the same approaches might be used by other adversaries.
Adobe has fixed a series of security vulnerabilities in Flash Player
The company said in an advisory Tuesday that the updates will address security flaws that "could potentially allow an attacker to take control of the affected system." The patches aim to fix flaws that could lead to code execution -- in other words, allowing an attacker to run malicious code.