’10-second’ hack jogs Fitbits into malware-spreading mode
To avoid viral stains, go jogging alone or with Bluetooth binned. A vulnerability in FitBit fitness trackers first reported to the vendor in March could still be exploited by theRead More →
Data Security News | Infosec Blog | Information Security Tutorials
To avoid viral stains, go jogging alone or with Bluetooth binned. A vulnerability in FitBit fitness trackers first reported to the vendor in March could still be exploited by theRead More →
Swindlers impersonate Apple service that remotely accesses user desktops. For years, scammers claiming that they’re “calling from Windows” have dialed up Microsoft customers and done their best to trick themRead More →
THE CHIP-ENABLED CREDIT card system long used in Europe, a watered down version of which is rolling out for the first time in America, is meant to create a doubleRead More →
Apps are “definitely the kind of stuff that Apple should have caught,” researcher says. Researchers said they’ve found more than 250 iOS apps that violate Apple’s App Store privacy policyRead More →
Facebook will now detect when state hackers are trying to hijack accounts, and alert users when it happens Alex Stamos, Chief Security Officer at Facebook, has announced a new systemRead More →
The number of countries deploying it grows to 32.FinFisher, a piece of spyware sold to governments by a German security vendor, has been linked by recent research to at leastRead More →
Industry looking to improve access controls and authentication, but decisions still governed by security requirements, use cases, hacker disruption. Yahoo this week became the latest to pass out the torchesRead More →
A group of Russian hackers infiltrated the servers of Dow Jones & Co., owner of the Wall Street Journal and several other news publications, and stole information to trade onRead More →
HTTP Strict Transport Security (HSTS) was designed to help secure websites (those using HTTPS) by declaring to web browsers that they should communicate only via HTTPS with the server toRead More →
A banking trojan, detected by ESET as Win32/Brolux.A, is targeting Japanese internet banking users and spreading through at least two vulnerabilities: a Flash vulnerability leaked in the Hacking Team hackRead More →
Researchers show how mass decryption is well within the NSA’s $11 billion budget. For years, privacy advocates have pushed developers of websites, virtual private network apps, and other cryptographic softwareRead More →
You may be under the impression that the new EMV chip system for credit card payments is nice and secure. But the UK’s been using it since 2003 — soRead More →
Over the years, the McAfee Labs team has worked with IT security vendors, law enforcement and others to identify and evaluate numerous websites, chat rooms, and other online platforms, communities,Read More →
Cyber security audit and ethical hacking training professionals normally use scanner to scans the networks. Scanning every IP address on the internet isn’t an easy job, and if you don’tRead More →
Putrid Piper picked apart a packet for just $15. KU Leuven Phd student Mathy Vanhoef has smashed conventional wireless security thought by creating continual, targeted and virtually indefensible stealth jammingRead More →
The maker of USB Killer is here with the USB Killer version 2.0 – a more advanced version of the computer frying USB drive. The Killer USB v2.0 is more refinedRead More →
Depressingly familiar and stupid mistakes in EEG kit, health org’s storage of recorded brains. BruCon: Behold the future: attackers can already get between brain-waves and hospital kit, and it’s justRead More →
The privacy community scored a victory in a year-long battle over the future of encryption: In internal discussions, the White House quietly overruled law enforcement and intelligence officials, deciding thatRead More →
US Ports are still vulnerable to cyber attacks that release dangerous chemicals, cybersecurity in the maritime industry is crucial for Homeland security. Critical infrastructure across the world are vulnerable toRead More →
AndroidOS.SmsThief does what it says on the tin – acts as a thief through SMS, on Android. Mobile network security and threat detection company AdaptiveMobile says it has been trackingRead More →