Skip to main content

Security

FBI and DOJ threaten tech companies with legislation forcing them to break encryption

posted onJuly 10, 2015
by l33tdawg
Credit:

Yesterday FBI Director James Comey and Deputy Attorney General Sally Quillian Yates testified before a Senate Judiciary committee that they are stumped by end-to-end encryption and that while they want to work with the private sector to come up with a solution Yates noted that a legislative mandate “may ultimately be necessary” to force companies to comply.

Adobe patches Flash zero-day found in Hacking Team data breach

posted onJuly 9, 2015
by l33tdawg
Credit:

Adobe patches a Flash zero-day vulnerability found as part of the massive data breach of Hacking Team. Experts recommend speedy remediation as the flaw has been added to multiple exploit kits.

The massive Hacking Team data breach led to the release of 400GB worth of data including a zero-day vulnerability for Adobe Flash. Adobe has released an out-of-band patch for the flaw just two days after it was discovered.

Apple to remove Recovery Key from iOS 9, OS X 10.11 two-factor authentication process

posted onJuly 9, 2015
by l33tdawg
Credit:

Apple on Wednesday confirmed that the removal of a pesky Recovery Key security mechanism will be one of the changes coming to its two-factor authentication solution when iOS 9 and OS X 10.11 El Capitan are released this fall.

Currently, the Recovery Key system in Apple's "two-step" protocol works as a failsafe for accessing an Apple ID when registered trusted device or phone number is unavailable. Under the existing setup, losing both a trusted device and Recovery Key renders the account inaccessible, which has in the past forced some users to abandon their Apple IDs altogether.

Hacking Team hacked, attackers claim 400GB in dumped data

posted onJuly 6, 2015
by l33tdawg
Credit:

On Sunday, while most of Twitter was watching the Women's World Cup – an amazing game from start to finish – one of the world's most notorious security firms was being hacked.

Specializing in surveillance technology, Hacking Team is now learning how it feels to have their internal matters exposed to the world, and privacy advocates are enjoying a bit of schadenfreude at their expense.

Your Wi-Fi Network’s Soft Underbelly

posted onJuly 6, 2015
by l33tdawg
Credit:

You probably don’t spend much time thinking about your wireless router—until it stops working, that is. Our inattention to routers has been a security problem for years, most recently last week when Brian Krebs reported that researchers at the Fujitsu Security Operations Center had discovered hundreds of routers were being used to spread a financial fraud malware called Dyre.

Hillary Clinton accuses China of widespread hacking

posted onJuly 6, 2015
by l33tdawg
Credit:

US presidential candidate Hillary Clinton has accused China of "trying to hack into everything that doesn't move in America" and stealing government information, in strongly worded comments likely to irk Beijing.

Clinton, a former secretary of state, pulled no punches in remarks to Democratic supporters at a campaign event in New Hampshire on Saturday.

Adobe patches zero-day Flash Player flaw used in targeted attacks

posted onJune 24, 2015
by l33tdawg
Credit:

 Adobe Systems released an emergency security update for Flash Player Tuesday to fix a critical vulnerability that has been exploited by a China-based cyberespionage group.

Over the past several weeks, a hacker group identified as APT3 by security firm FireEye has used the vulnerability to attack organizations from the aerospace, defense, construction, engineering, technology, telecommunications and transportation industries.

RubyGems slings patch at nasty redirect trojan holes

posted onJune 24, 2015
by l33tdawg
Credit:

Get patching: new vulns in the RubyGems developer distribution platform could expose millions of users to malicious redirects.

The hole (CVE-2015-3900) since patched means clients could be pushed to Gem severs hosting malicious content even if HTTPS is employed.

Attackers further benefited since RubyGems Gems Server Discovery did not validate if DNS replies are from the same security domain as gem sources. Gems are used in Ruby libraries for software development and distribution and are pushed out to servers for user installation.

Pita Bread Radio Can Hack Through Any Laptop’s Encryption

posted onJune 23, 2015
by l33tdawg
Credit:

Researchers at Tel Aviv University have come up with a clever way to hack into laptops: using a radio receiver and a piece of pita bread.

The researchers published their findings online, showing that many laptop models give off electromagnetic radiation that can be manipulated into revealing the passwords stored on laptops.