Until late January, Apple's App Store servers did not encrypt all communications with iOS clients, which exposed users to several potential attacks, according to a Google security researcher. "The Apple App Store and associated ...
Tags: iOS App Store, iOS clients, Apple
Researchers from security firm Symantec have found and analyzed a version of the Stuxnet cybersabotage malware that predates previously discovered versions by at least two years and used a different method of disrupting uranium enrichment ...
Tags: Symantec, Stuxnet cybersabotage malware, disrupting uranium enrichment
Security researchers have identified an ongoing cyber-espionage campaign that compromised 59 computers belonging to government organizations, research institutes, think tanks and private companies from 23 countries in the past 10 days. ...
Tags: cyber-espionage, computers, cyber security
HP on Monday unveiled its Big Data Security strategy, describing how combining the enterprise search and knowledge management resources from its Autonomy subsidiary with its ArcSight security-event and information management (SIEM) can ...
Tags: HP, Big Data Security Strategy, SIEM
Twitter has implemented DMARC, a standard for preventing email spoofing, in order to make it harder for attackers to send phishing emails that appear to come from twitter.com addresses. Twitter users are constantly targeted in phishing ...
Tags: Twitter, DMARC, company news
Twitter is urging its account holders to be smarter with their passwords following two recent attacks by hackers directed at Burger King and Jeep that took control of those accounts. The accounts for Burger King and the Chrysler-owned car ...
Tags: Twitter, account security, Internet
Mozilla is taking steps to limit the risk of powerful subordinate Certificate Authority (CA) certificates falling into the hands of attackers and potentially being used to issue rogue certificates for use in SSL snooping attacks. The ...
Tags: Mozilla, browser maker, browser
Several Certificate Authorities (CAs) have formed an advocacy group called the Certificate Authority Security Council (CASC), which will focus on promoting new security standards, policies and best practices for SSL (Secure Sockets Layer) ...
Tags: CAs, web security, SSL deployment
Financial malware authors are trying to evade new online banking security systems by returning to more traditional phishing-like credential stealing techniques, according to researchers from security firm Trusteer. Most financial Trojan ...
The developers of many SSL libraries are releasing patches for a vulnerability that could potentially be exploited to recover plaintext information, such as browser authentication cookies, from encrypted communications. The patching ...
Financial malware authors are returning to traditional, phishing-like, credential-stealing techniques in order to evade detection, according to researchers from security firm Trusteer. Most financial Trojan programs used by cybercriminals ...
Tags: Financial malware, credential-stealing techniques, detection
The all-electric Nissan LEAF may be known for being quiet on the outside, but now it's boomin' on the inside with the first custom-designed Bose Energy Efficient Series sound system available on the 2013 model that goes on sale this month. ...
Tags: Nissan, Bose Sound, Consumer Electronics
Imagination Technologies has announced that it is among the first to submit PowerVR Series6 ‘Rogue’ drivers for OpenGL ES 3.0 conformance with Khronos. OpenGL ES is a royalty-free, cross-platform API for full-function 2D and ...
Many of the domain names used by a cybercriminal gang to control computers infected with the Virut malware were disabled last week in a coordinated takedown effort, Spamhaus, an organization dedicated to fighting spam, announced Saturday. ...
The Virut botnet suffered a major setback last week, after it was announced that many of the domain names used by a cybercriminal gang to control computers infected with the malware had been disabled. This was the result of coordinated ...