First, Apple revealed a critical bug in its implementation of encryption in iOS, requiring an emergency patch. Then researchers found the same bug is also included in Apple’s desktop OSX operating system, a gaping Web security hole that leaves users of Safari at risk of having their traffic hijacked. Now one researcher has found evidence that the bug extends beyond Apple’s browser to other applications including Mail, Twitter, Facetime, iMessage and even Apple’s software update mechanism.
Bluebox emerged from stealth mode today with a new offering that aims to address mobile app security demands. Instead of trying to solve the bring-your-own-device (BYOD) challenge, Bluebox is positioning itself to offer bring-your-own-apps (BYOA) technology for both Android and IOS devices.
Bluebox is backed by Andreessen Horowitz and Sun Microsystems co-founder Andy Bechtolsheim, and recently announced an $18 million round of funding to fuel its efforts.
Belkin International issued a statement late on Feb. 18 that it has fixed vulnerabilities in its WeMo line of home-electronics control devices that were reported by security research firm IOActive.
Earlier on Feb. 18, IOActive issued a public advisory warning of vulnerabilities in Belkin's WeMo connected home devices. The WeMo product line includes Internet connected light and power switches that enable users to remotely control their devices via IOS and Android mobile apps.
Attackers can access a user's Google Drive files and record them through their webcam by tricking the user into clicking hidden links, a researcher found.
The click-jacking attack takes advantage of the Google Picker application interface, which allows users to preview files stored within Drive and via third-party applications.
The sensitive personal information for more than 300,000 faculty, staff, and students at the University of Maryland were stolen in a "sophisticated" cyber attack on the school's recently bolstered security defenses, the school's president revealed late Wednesday.