web analytics
News Updates

Study: Firmware Plagued By Poor Encryption and Backdoors

itwbennett writes: The first large-scale analysis of firmware has revealed poor security practices that could present opportunities for hackers probing the Internet of Things. Researchers with Eurecom, a technology-focused graduate school in France, de…

News Updates

Microsoft Updates Windows 8.1 And Surface Tablets

Microsoft Way It’s a big day in the Windows world, with Microsoft rolling out a grip of security patches, updates for Surface tablets, and new capabilities for Windows 8.1 as part of its August update.
Regarding the security fixes, nine security updates are part of the package, addressing what Microsoft calls “37 unique Common Vulnerabilities and Exposures.” Read More

News Updates

The Cavalry Rides Into Auto Industry With Security Proposal

A grassroots group calling itself “I Am The Cavalry” has published an open letter to the automotive industry offering its services in ensuring security and safety. “Modern vehicles are computers on wheels and are increasingly connected and controlled by software and embedded devices,” the letter reads. New technology “introduces new classes of accidents and adversaries,” the group pointed out.

News Updates

Ask Slashdot: Why Are Online Job Applications So Badly Designed?

First time accepted submitter GreyViking (3606993) writes Over the past few years, I’ve witnessed a variety of my intelligent but largely non-technical nearest-and-dearest struggling to complete online job applications. The majority of these online for…

News Updates

Hackers Demand Automakers Get Serious About Security

wiredmikey writes: In an open letter to Automotive CEOs, a group of security researchers has called on automobile industry executives to implement five security programs to improve car safety and build cyber-security safeguards inside the software syst…

News Updates

Taking the Temperature of Java App Security

Current approaches to Java application protection place security at the application or the network layer, both of which are problematic. The first approach has proven to be too complex, too time consuming and too risky — in other words, “too hot.”
Meanwhile, network level security that consists of perimeter devices lacks the intelligence to know what’s going on inside the application.

News Updates

Connected Collar Lets Your Cat Do the War-Diving

MojoKid (1002251) writes “Security researcher Gene Bransfield, with the help of his wife’s grandmother’s cat, decided to see how many neighborhood WiFi access points he could map and potentially compromise. With a collar loaded with a Spark chip, a Wi-…

News Updates

Connected Collar Lets Your Cat Do the War-Driving

MojoKid (1002251) writes “Security researcher Gene Bransfield, with the help of his wife’s grandmother’s cat, decided to see how many neighborhood WiFi access points he could map and potentially compromise. With a collar loaded with a Spark chip, a Wi-…

News Updates

Silent Circle’s Blackphone Exploited at Def Con

Def Con shows no mercy. As gleefully reported by sites several Blackberry-centric sites, researcher Justin Case yesterday demonstrated that he could root the much-heralded Blackphone in less than five minutes. From n4bb.com’s linked report: “However, o…

News Updates

Cornering the Market On Zero-Day Exploits

Nicola Hahn (1482985) writes Kim Zetter of Wired Magazine has recently covered Dan Greer’s keynote speech at Black Hat USA. In his lengthy address Greer, representing the CIA’s venture funding arm, suggested that one way that the United States governme…

Page 10 of 240« First...«89101112»203040...Last »

Donation

Facebook Like Box