Skip to main content

Security

Cybersecurity experts discover lapses in Heartbleed bug fix

posted onNovember 9, 2014
by l33tdawg

A detailed analysis by cybersecurity experts from the University of Maryland found that website administrators nationwide tasked with patching security holes exploited by the Heartbleed bug may not have done enough.

First disclosed in April 2014, Heartbleed presents a serious vulnerability to the popular OpenSSL (Secure Sockets Layer) software, allowing anyone on the Internet to read the memory of systems that are compromised by the malicious bug.

Presence brings free home security to iOS users

posted onNovember 7, 2014
by l33tdawg

People Power knows that you probably have a nice assortment of outdated (but still decently functional) iOS devices at home. And if they're just taking up space anyway, you might as well find a clever way to repurpose them.

So it developed Presence, an app designed to quickly convert your backup iPhone, iPad or iPod Touch into a quasi-security-camera.

iOS 8 jailbreak finally 'stable enough' to use

posted onNovember 7, 2014
by l33tdawg

iOS 8 has been technically jailbroken since October 22, but it’s taken weeks to get it polished enough for Cydia, the jailbreak alternative to the App Store.

Now that things are “stable enough,” Cydia creator Jay Freeman has flipped the switch to start allowing the sale of iOS 8 tweaks and themes.

A group of Chinese hackers called Pangu made and released the iOS 8 jailbreak last month, but it was a rather crude implementation that required bug fixes and updates to make it safe for users beyond the most experienced jailbreakers.

Hackers Devise New Simplified Phishing Method

posted onNovember 7, 2014
by l33tdawg

Just in time for the holiday season, phishers have devised a more efficient way to get unwary online shoppers to part with their personal data and financial account information.

The new technique, dubbed Operation Huyao by the security researchers at Trend Micro who discovered it, basically lessens the time and effort needed for attackers to mount a phishing campaign while also making such attacks harder to spot.

China to lay out massive quantum network for information security

posted onNovember 6, 2014
by l33tdawg

With the maturity of China's quantum information science and technology, an advanced network that is considered unhackable and will provide the most secure encryption technology is ready to commercialise in China, according to Pan Jianwei, a quantum scientist and professor at the University of Science and Technology of China, Xinhua reported on Tuesday.

EFF Finds Apple’s iMessage To Be The Most Secure Mass-Market Option

posted onNovember 6, 2014
by l33tdawg

 The Electronic Frontier Foundation or EFF, a non-profit digital rights group, has investigated the security of various messaging apps and created a new Secure Messaging Scorecard, ranking messaging apps and tools like iMessage, FaceTime, BlackBerry Messenger, Skype, Snapchat, and more, based on seven different factors:

Subtle home security from a single Point

posted onNovember 6, 2014
by l33tdawg

2014 has seen a veritable glut of security-minded gadgets on crowdfunding sites like Kickstarter, all of them looking to add some sort of sensor tech into your living room. One of the latest examples is Point, an app-enabled smoke detector with additional sensors capable of monitoring things like temperature spikes, humidity levels, and unusual noises.

Most Effective CISOs Have Business Background, Says IBM Security Leader

posted onNovember 6, 2014
by l33tdawg

Don't feel insecure about your lack of a heavy technical background, CISOs, because the most successful CISOs are those with a business background, said Kris Lovejoy, general manager of IBM Security Services, at an IBM security leadership forum Wednesday.

Lovejoy provided a preview of research IBM conducted about the state of the CISO; the full report will be released next month. Among the findings: Most CISOs report into IT (and the CIO) "because that's where the money is," while others are reporting to their CEO, chief operating officer, or chief administrative officer.