Skip to main content

Security

​Two highly dangerous OpenSSL security bugs have been patched

posted onMay 4, 2016
by l33tdawg

The OpenSSL cryptographic library is used to provide Secure-Socket Layer (SSL) and Transport Layer Security (TLS) in many popular web sites. These include Twitter, GitHub, Yahoo, Tumblr, Steam, and DropBox.

OpenSSL isn't just used in web sites. OpenVPN, an open-source virtual private network, and older versions of the secure login and terminal program OpenSSH, use OpenSSL.

Isis hackers 'infiltrate' UK's Ministry of Defence and threaten to leak 'secret intelligence'

posted onMay 4, 2016
by l33tdawg

A hacker-group affiliated to Islamic State (Isis) has claimed to have planted a mole in the Ministry of Defence and is threatening to leak secret British intelligence data. The group, which goes by the name Islamic State Hacking Division, had earlier published an anti-drone warfare document, in which it had listed US Air Force drone pilots – believed to be involved in air strikes against terrorists in Iraq and Syria – as potential targets of the militants.

Researchers Discover Security Flaws In Samsung’s Smart Home Platform

posted onMay 3, 2016
by l33tdawg

Given that email has been around for a very long time now, it is not surprising that over the years, its security has been improved upon to the point where emails are now relatively secure, assuming that on your end you don’t do anything that could compromise its security. Unfortunately the same cannot be said for smart home platforms, which for the most part is still new-ish tech.

Fitbit's Aria internet-connected scale can be hacked

posted onMay 2, 2016
by l33tdawg

These days more and more items around our homes are connected to the internet. In theory, this sounds like a great idea, and it can be -- providing it is implemented correctly, meaning in a secure way. In practice, however, that isn't always the case. We've seen endless stories of what can go wrong, even Barbie dolls turned bad.

Scales are probably one of the last things you'd expect to be connected. Actually, though, that innovation came several years ago with a scale that tweeted your weight -- a great way of shaming you into continuing that diet and exercise program.

Strengthening authentication through big data

posted onMay 2, 2016
by l33tdawg

The fact that plain passwords are no longer safe to protect our digital identities is no secret. For years, the use of two-factor authentication (2FA) and multi-factor authentication (MFA) as a means to ensure online account security and prevent fraud has been a hot topic of discussion.

Technological advances, especially in the mobile industry, have created new possibilities, and manufacturers and vendors are offering various multi-factor solutions in the domain of biometrics, physical tokens, software tokens and mobile codes.

Qatar National Bank claims customer data released by hackers is authentic

posted onMay 2, 2016
by l33tdawg

Qatar National Bank has admitted that its systems were hacked but said that the information released online was a combination of data picked up from the attack and from other sources such as social media.

The incident would not have a financial impact on the bank’s customers whose accounts are secure the bank said, without providing details of how its systems were hacked, the possible identity of the hackers, and what information was harvested.