Using a long phrase or a short sentence as a password may not be as secure as some security experts think. Researchers at Carnegie Mellon University's Institute for Software Research have found that long passwords that incorporate grammar ...
Tags: Password, incorporate grammar, security
HP TippingPoint, the long-time organizer of the annual Pwn2Own hacking contest, has revamped the challenge for the second year running and will offer cash awards exceeding half a million dollars, more than five times the amount paid out ...
A Philips information management system, which is used in making administrative chores in hospital more efficient, contains vulnerabilities that can be exploited to gain full control of the product, a security vendor said on Thursday. ...
HP TippingPoint, the long-time organiser of the annual Pwn2Own hacking contest, announced on Friday that it will offer cash awards exceeding half a million dollars for this year’s competition, more than five times the amount paid out ...
Tags: Pwn2Own, Hacking Contest, HP TippingPoint
IDG News Service-Illness and legal advice stopped two founders of The Pirate Bay from speaking at the Hack in the Box security conference on Wednesday. Neither Peter"brokep"Sunde nor Fredrik"tiamo"Neij made the trip to Kuala Lumpur for ...
Tags: pirate bay founders, tracked down
Computer security conferences tend to be male-dominated affairs. It's not that women aren't present, but just not anywhere near their normal proportional representation in society. To address the disparity, the Power of Community ...
Tags: computer security, POC2012, women, male-dominated, hacking contest
Researchers have found a serious vulnerability in the game "Call of Duty: Modern Warfare 3," and another in the CryEngine 3 graphics platform on which many games run. Luigi Auriemma and Donato Ferrante of security consultancy ReVuln ...
Tags: vulnerability, Call of Duty, Modern Warfare 3, CryEngine 3, games
IDG News Service - A tool for testing if web application firewalls (WAFs) are vulnerable to around 150 protocol-level evasion techniques was released at the Black Hat USA 2010 security conference on Wednesday. The tool and the research ...
Tags: web application firewalls, Black Hat USA 2010, cyber security
A team of researchers has created a proof-of-concept piece of malware that can give attackers control of USB smart card readers attached to an infected Windows computer over the Internet. The malware installs a special driver on the ...
Tags: malware, USB, smart card readers, infected Windows computer, Internet
Attackers can read emails, contacts and other private data from the accounts of Yahoo users who visit a malicious page by abusing a feature present on Yahoo's Developer Network website, says an independent security researcher. A limited ...
Tags: Attackers, emails, private data, Yahoo users
Three widely deployed payment terminals have vulnerabilities that could allow attackers to steal credit card data and PIN numbers, according to a pair of security researchers from penetration testing firm MWR InfoSecurity in the U.K. The ...
Tags: payment terminals, MWR InfoSecurity, credit card data, PIN numbers
Google yesterday made good on a promise from earlier this year and shipped Chrome 23 with the "Do Not Track" privacy feature. In September, Google added a Do Not Track (DNT) option to Chrome's precursor, the open-source Chromium, and ...
Tags: Google, Chrome 23, privacy feature, DNT option
IDG News Service - Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6 -- in order to infect computers with malware, according to researchers from security vendor FireEye. ...
IDG News Service - Java vulnerabilities are increasingly exploited by attackers to infect computers, and the problem could become worse if Oracle doesn't do more to secure the product and keep its installation base up to date, according to ...
Tags: Java vulnerabilities, computers, Oracle, Flash Player, Adobe Reader
IDG News Service - It appears the hacker known as "Pinkie Pie" produced the first Chrome vulnerability at the Hack In the Box conference on Wednesday, just ahead of the deadline for the competition this afternoon. Google security ...
Tags: Pinkie Pie, Chrome vulnerability, software, company news