HIDDEN IN PLAIN SIGHT: BRUTE FORCING SLACK PRIVATE FILES
Last year we switched to using Slack for all our internal communication and it’s working out nicely. It’s very developer centric in that it offers integrations with lots of servicesRead More →
Last year we switched to using Slack for all our internal communication and it’s working out nicely. It’s very developer centric in that it offers integrations with lots of servicesRead More →
Major bug goes unnoticed in one of Java’s most popular libraries, despite getting a CVSS vulnerability score of 10 Back in late January, two security researchers (Gabriel Lawrence and ChrisRead More →
A variant of the Power Worm ransomware is infecting computers, encrypting their data files, and throwing away the encryption key, all because of an error in the malware’s programming. TheRead More →
HACKERS WHO BROKE into the personal email account of CIA Director John Brennan have struck again. This time the group, which goes by the name Crackas With Attitude, says itRead More →
“Hi, I’m from IT” call yielded access to customer records, lulz; Cox fined $596k. What’s the cost of giving up customers’ information because of weak information security practices? For CoxRead More →
Rafael Salema Marques is a Brazilian cyber-security researcher and, above all, a devoted Mac user. Today, Mr. Marques published a LinkedIn blog post and proof-of-concept video on YouTube, detailing aRead More →
We’re your servants, says general counsel unconvincingly After spending months pressuring tech companies to add backdoors into their encryption software, the FBI says it has given up on the idea.Read More →
Fake jQuery injections have been popular among hackers since jQuery itself went mainstream and became one of the most widely adopted JavaScript libraries. Every now and then we write aboutRead More →
Follow-on attacks show capabilities “commonly possessed by state-sponsored actors.” A provider of end-to-end encrypted e-mail said it paid a ransom of almost $6,000 to stop highly advanced denial-of-service attacks thatRead More →
Cyber-security vendors are revealing their statistics for the third quarter (Q3) of 2015, and a popular topic is DDoS attacks, a tactic widely used to mask more serious intrusions, toRead More →