Skip to main content

Security

Google patches critical bug on Android Nexus 5X devices

posted onSeptember 4, 2016
by l33tdawg

Google's Android security team patched a critical vulnerability in the company's Nexus 5X devices which would have let attackers bypass the lockscreen. An attacker who successfully triggered the vulnerability would be able to obtain data stored on the device via a forced memory dump, according to researchers from the IBM's X-Force team.

Vladimir Putin denies any involvement in cyberattack on DNC

posted onSeptember 4, 2016
by l33tdawg

The Democratic National Committee’s convention in July was a historic moment for women in the U.S. with the official nomination of Hillary Clinton as the Democrats’ pick for president, but another headline also grabbed attention. Following reports of a cyberattack in June that breached the DNC’s network and stole data on Donald Trump, the FBI confirmed an investigation into the hack in the first official acknowledgement of a federal probe into the event.

Hacking group OurMine takes control of Variety website, spams readers with email

posted onSeptember 4, 2016
by l33tdawg

The group of hackers going by the name OurMine managed to briefly take over the website for the entertainment new outlet Variety this weekend. If the name OurMine sounds familiar, it's because the same collective was responsible for hacking social media accounts belonging to high-profile tech CEOs recently, including Twitter's Jack Dorsey, Google's Sundar Pichai, and even Mark Zuckerberg of Facebook.

Why identity protection is the next phase in security

posted onSeptember 4, 2016
by l33tdawg

Talk to any security expert, and sooner or later the line "It's not a case of if you are hacked, but when" will be trotted out. It's a good line because it is true and demonstrates how perimeter-style security has fallen by the wayside.

But consider the implicit implications of everyone eventually being breached, not as a sysadmin or security specialist, but as a user of services, and you will realise what it means for your personal information.

Hacking mobile login tokens tricky but doable, says reverse-engineer

posted onSeptember 3, 2016
by l33tdawg

L33tdawg: The slides and whitepaper from Bernhard's #HITBGSEC talk is available here: http://gsec.hitb.org/sg2016/sessions/attacking-software-tokens/

Mobile apps that generate on-screen tokens for two-factor authentication can be examined and cloned by malware, a security researcher warns.

Fraudsters and crooks can take these clones and generate the codes necessary to login into bank accounts and other online services as their victims.

Microsoft announces Advanced Threat Analytics 1.7 for enhanced enterprise security

posted onSeptember 2, 2016
by l33tdawg

Roughly 108 days ago, Microsoft released its Advance Threat Protection service into preview for its eager enterprise customers looking to an early look at latest productivity, security, and device management capabilities coming to Windows 10.

Now, three months later, Microsoft’s threat analytics team has felt confident enough in the feedback they’ve received to release its Advance Threat Analytics (ATA) v 1.7 for public consumption.

Apple releases OS X patch for spyware exploit

posted onSeptember 2, 2016
by l33tdawg

Apple issued an urgent security update on Thursday for OS X and Safari after finding the same vulnerabilities in its desktop operating system that were discovered last week in its mobile operating system and that allow attackers to remotely take control of a device.

Regular password changes make things worse

posted onSeptember 2, 2016
by l33tdawg

Security experts have been saying for decades that human weakness can trump the best technology.  Apparently, it can also trump conventional wisdom.

Since passwords became the chief method of online authentication, conventional wisdom has been that changing them every month or so would improve a person’s, or an organization’s, security.

Not according to Lorrie Cranor, chief technologist of the Federal Trade Commission (FTC), who created something of a media buzz earlier this year when she declared in a blog post that it was, “time to rethink mandatory password changes.”

Hacker Guccifer, who targeted presidents and celebrities, gets 4 years in prison

posted onSeptember 2, 2016
by l33tdawg

Marcel Lehel Lazar, a 44-year-old Romanian, was sentenced to 52 months in prison for hacking high-profile figures including former Presidents George H. W. Bush and George W. Bush.

Using his nickname Guccifer, he was credited with uncovering the existence of a private email server for former secretary of state and now Democratic presidential nominee Hillary Clinton. Other victims included former Secretary of State Colin Powell and celebrities such as Robert Redford, Steve Martin and Nicole Kidman.