Feed aggregator

New Verizon leak exposed confidential data on internal systems

zdnet 0 day - Fri, 09/22/2017 - 12:00
Dozens of documents reveal detailed maps and configurations of internal Verizon servers.
Categories: Security News

This new app can detect wireless credit card skimmers at gas pumps

zdnet 0 day - Fri, 09/22/2017 - 07:30
Credit card skimmers are getting more advanced - but that's making them easier to detect.
Categories: Security News

Boston Red Sox Caught Using Technology to Steal Signs

Bruce Shneier's Blog - Fri, 09/22/2017 - 06:21
The Boston Red Sox admitted to eavesdropping on the communications channel between catcher and pitcher. Stealing signs is believed to be particularly effective when there is a runner on second base who can both watch what hand signals the catcher is using to communicate with the pitcher and can easily relay to the batter any clues about what type of... Bruce Schneier
Categories: Security News

ISP involvement suspected in latest FinFisher gov't spyware campaign

zdnet 0 day - Fri, 09/22/2017 - 05:01
ISPs in a number of countries are under suspicion for distributing the malware to government targets.
Categories: Security News

Joomla patches eight-year-old critical CMS bug

zdnet 0 day - Fri, 09/22/2017 - 03:52
The flaw could be exploited to steal administrator account details and hijack websites.
Categories: Security News

SEC admits data breach, suggests illicit trading was key

zdnet 0 day - Thu, 09/21/2017 - 05:52
The commission says that "illicit gain through trading" may have been the key motivator.
Categories: Security News

ISO Rejects NSA Encryption Algorithms

Bruce Shneier's Blog - Thu, 09/21/2017 - 05:50
The ISO has decided not to approve two NSA-designed block encryption algorithms: Speck and Simon. It's because the NSA is not trusted to put security ahead of surveillance: A number of them voiced their distrust in emails to one another, seen by Reuters, and in written comments that are part of the process. The suspicions stem largely from internal NSA... Bruce Schneier
Categories: Security News

CCleaner malware operators targeted tech firms including Cisco, Microsoft, Samsung

zdnet 0 day - Thu, 09/21/2017 - 04:02
Updated: It is believed the threat actor behind the campaign is after intellectual property.
Categories: Security News

2017's biggest hacks, leaks, and data breaches — so far

zdnet 0 day - Wed, 09/20/2017 - 15:29
Dozens of data breaches, millions of people affected.
Categories: Security News

IT admin sentenced after blackmailing business, redirecting website to porn

zdnet 0 day - Wed, 09/20/2017 - 07:14
The admin demanded $10,000 from a company after sabotaging their website.
Categories: Security News

What the NSA Collects via 702

Bruce Shneier's Blog - Wed, 09/20/2017 - 06:12
New York Times reporter Charlie Savage writes about some bad statistics we're all using: Among surveillance legal policy specialists, it is common to cite a set of statistics from an October 2011 opinion by Judge John Bates, then of the FISA Court, about the volume of internet communications the National Security Agency was collecting under the FISA Amendments Act ("Section... Bruce Schneier
Categories: Security News

CCTV cameras enslaved to infiltrate air-gap networks

zdnet 0 day - Wed, 09/20/2017 - 04:59
Surveillance camera lighting systems can create a web of light for leaking and extracting data from networks.
Categories: Security News

Twitter suspends 299,000 accounts linked to terrorism in past six months

zdnet 0 day - Tue, 09/19/2017 - 14:37
The company said 75 percent of the infringing accounts were suspended before their first tweet.
Categories: Security News

New to iOS 11? Change these privacy and security settings right now

zdnet 0 day - Tue, 09/19/2017 - 11:29
Before you do anything on your iPhone or iPad, you should lock it down. This is how you do it.
Categories: Security News

New alliance advocates the blockchain to improve IoT security, trust

zdnet 0 day - Tue, 09/19/2017 - 09:00
The Trusted IoT Alliance hopes to "set the standard" for IoT blockchain protocols worldwide.
Categories: Security News

Hackers reveal leading enterprise security blind spots

zdnet 0 day - Tue, 09/19/2017 - 07:00
Mobile devices and facial recognition software have made the list this year.
Categories: Security News

Apple's FaceID

Bruce Shneier's Blog - Tue, 09/19/2017 - 06:44
This is a good interview with Apple's SVP of Software Engineering about FaceID. Honestly, I don't know what to think. I am confident that Apple is not collecting a photo database, but not optimistic that it can't be hacked with fake faces. I dislike the fact that the police can point the phone at someone and have it automatically unlock.... Bruce Schneier
Categories: Security News

Pirate Bay uses your PC to mine cryptocurrency in quest to become ad-free

zdnet 0 day - Tue, 09/19/2017 - 04:58
Could CPU usage replace adverts in the future?
Categories: Security News

HP's Aruba announces 360 Secure Fabric analytics security solution

zdnet 0 day - Mon, 09/18/2017 - 11:00
Aruba says the new offering will simplify and improve enterprise security.
Categories: Security News

Bluetooth Vulnerabilities

Bruce Shneier's Blog - Mon, 09/18/2017 - 06:58
A bunch of Bluetooth vulnerabilities are being reported, some pretty nasty. BlueBorne concerns us because of the medium by which it operates. Unlike the majority of attacks today, which rely on the internet, a BlueBorne attack spreads through the air. This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and... Bruce Schneier
Categories: Security News