Skip to main content

Security

Microsoft plans to patch IE zero day -- eventually

posted onMay 23, 2014
by l33tdawg

Microsoft said Thursday it plans eventually to patch a vulnerability in Internet Explorer 8 that it's known about for seven months, but it didn't say when.

A security research group within Hewlett-Packard called the Zero Day Initiative (ZDI) released details of the flaw on Wednesday after giving Microsoft months to address it. The group withholds details of vulnerabilities to prevent tipping off hackers but eventually publicizes its findings even if a flaw isn't fixed.

Houseguest downloads child porn, cops show up

posted onMay 23, 2014
by l33tdawg

Do you really know how your various friends, relations, acquaintances, and hangers-on plan to use your Internet connection when they drop by and ask for "the Wi-Fi password"? Unlikely—and yet anything that they do illegally through your home network can bring cops to your door with search warrants, asking tough questions about child pornography.

Cisco slurps security scanner

posted onMay 22, 2014
by l33tdawg

Cisco has continued the expansion of its security portfolio with the acquisition of malware analysis outfit ThreatGRID.

The acquisition target was founded in 2012, one of the then-burgeoning number of companies that pushed malware analysis, threat intelligence, and security analytics into the cloud (supplemented by an on-premise appliance).

Change Your eBay Password Now

posted onMay 22, 2014
by l33tdawg

eBay is asking all users to change their passwords because of a cyberattack.

It says that the attack compromised passwords and other nonfinancial data. Cyberattackers reportedly used employee credentials to gain unauthorized access to eBay's corporate network and a database that contained customers' names, encrypted passwords, email addresses, physical addresses, phone numbers, and dates of birth.

Hackers shows off unavailable iOS 7.1.1 untethered jailbreak

posted onMay 20, 2014
by l33tdawg

Not one but two well-known hack researchers have now posted evidence of working jailbreaks for iOS 7.1.1, which until now had closed the existing loopholes used by other techniques such as evasi0n. While interest in and use of jailbreaks has waned as Apple has gotten better at closing vulnerabilities, enthusiasts and die-hard customizers continue to want the ability to use unofficial apps or tweak settings in the latest iOS releases.

Chinese state-owned enterprises 'hired' military hacking unit

posted onMay 20, 2014
by l33tdawg

A U.S. criminal indictment against Chinese Army personnel over alleged hacking describes how stolen intellectual property was funneled to Chinese companies, an unresolved question for analysts.

In the first legal action of its kind, federal prosecutors charged five members of Chinese Army signals intelligence Unit 61398 with stealing nuclear, solar power and steel trade secrets from six U.S. organizations over eight years. China denies the accusations.

Tor security compromised by NSA, according to Microsoft

posted onMay 19, 2014
by l33tdawg

Andy Malone, head of Microsoft's Enterprise Security, claims that the TOR (The Onion Router) network does not provide the anonymity that its many users think it does.

Speaking at Microsoft's TechEd North America event earlier this week, the founder of the Cyber Crime Security Forum said that hackers and government agencies can now compromise the security of the TOR network.  

Whistleblowers Beware: Apps Like Whisper and Secret Will Rat You Out

posted onMay 15, 2014
by l33tdawg

Anonymously spilling personal gossip and corporate secrets online is all fun and games–until someone gets a subpoena.

Startups like Secret and Whisper have defined a buzzy new category of social media, attracting millions of users and tens of millions of dollars in venture capital investments with the promise of allowing anyone to communicate with anonymity. But when it comes to actually revealing corporate and government secrets–a “whistleblowing” function that the two services either implicitly or explicitly condone–users should read the fine print.

Bitly Installs Two-Factor Security After Insider Account Compromise

posted onMay 15, 2014
by l33tdawg

Back on May 8, popular URL-shortening service Bitly admitted that its systems were compromised. As it turns out, Bitly has now disclosed that the problem is just the latest example of an insider compromise.

"We audited the security history for our hosted source code repository that contains the credentials for access to the offsite database backup storage and discovered an unauthorized access on an employee's account," Rob Platzer, CTO of Bitly, wrote in a blog post.