testing pos...
Recent News
Angela Merkel’s phone was being listened in on by FIVE foreign powers • The Register
Over on the post “Angela Merkel’s phone was being listened in on by FIVE foreign powers • The Register” contains this text: “”
Million-dollar robbery rocks bitcoin exchange | Security – InfoWorld
Over on the post “Million-dollar robbery rocks bitcoin exchange | Security – InfoWorld” contains this text: “”
‘Blackshades’ malware still being sold, Symantec says | Security – InfoWorld
‘Blackshades’ malware still being sold, Symantec says | Security – InfoWorld: “” (Via .)
NSA ‘infected’ 50,000 networks with malware
The US National Security Agency (NSA) infected 50,000 networks with malware, Dutch newspaper NRC has reported. The Tailored Access Operations department used it to steal sensitive information, according to a censored slide leaked by former NSA contractor Edward Snowden. NRC said 20,000 networks had been hit in 2008, with the program recently expanded to include […]
How to Spot a Fake Facebook Friend Request
Did some beautiful model just send you a Facebook friend request? You try to remember if you know this person from anywhere, but you’re coming up blank? Are they legit or are they a scammer, or something worse? In this week’s featured article: How to Spot a Fake Friend Request, we’ll find out some reasons […]
UH notifies 7,100 patients of stolen hard drive with personal medical information on it
CLEVELAND, Ohio — More than 7,100 University Hospitals patients received notification by mail this week that their protected personal medical information was potentially exposed after a hard drive containing physician office data was stolen from a third-party vendor helping to upgrade the health system’s computer systems . Someone stole the hard drive from the car […]
Ultrasonic more then bugs talking…….or “bab bios” or should it be sound gaps not air gaps
Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps Like a super strain of bacteria, the rootkit plaguing Dragos Ruiu is omnipotent. Three years ago, security consultant Dragos Ruiu was in his lab when he noticed something highly unusual: his MacBook Air, on which he had just installed a fresh copy of […]
Well it’s been a year or so since I last mused about security and it’s still
Driven by the people element. End users still have the the keys to the kingdom and malware and phishing have clearly marked them for targeting. The Standard number of targeted phishings at my employer is well over 20 a month. The human element is still opening email from “DEAD cousin NED” and we apparently all […]
Hackers reveal critical vulnerabilities in Huawei routers at Defcon
Over on InfoWorld SECURITY Feed the post “Hackers reveal critical vulnerabilities in Huawei routers at Defcon” contains this text: “ Security researchers disclosed critical vulnerabilities in routers from Chinese networking and telecommunications equipment manufacturer Huawei at the Defcon hackers conference on Sunday. The vulnerabilities — a session hijack, a heap overflow, and a stack overflow […]
#Defcon: Marlinspike expands Cloudcracker – Networks – SC Magazine Australia – Secure Business Intelligence
Over on the post “#Defcon: Marlinspike expands Cloudcracker – Networks – SC Magazine Australia – Secure Business Intelligence” contains this text: “ AUSTRALIAN EDITION ? SIGN INJOIN POPULAR: injection , attack , sql HOMENEWSIN DEPTHREVIEWSEVENTSSC AWARDS WHAT WE’RE FOLLOWING: AAPT breach • Black Hat 2012 • Print edition • Jobs • Fixer Home / Security […]