IDG News Service - Security researcher Felix "FX" Lindner has a more compelling reason to steer clear of routers from Huawei Technologies than fears about its ownership. While the company blasted for its opaque relationship with China's ...
Tags: Huawei, ownership, China's government
IDG News Service - Facebook users who have associated a mobile phone number with their accounts in order to enable the "Login Approvals" security feature can no longer be found on the website based on those phone numbers, the company said ...
Tags: Facebook, Mobile Numbers, functionality
A security researcher known for finding Java bugs has uncovered a new critical zero-day vulnerability in all currently-supported versions of the popular Oracle software. The bug,which was publicly reported on the Full Disclosure security ...
Tags: Zero-Day Java Bug, security researcher, Security Explorations
Attendees at a security conference were left stunned when a researcher demonstrated how a hidden web code could allow a Samsung Galaxy S3's data to be completely wiped. The code,which is currently available online and consists of 11 ...
Tags: Samsung Galaxy S3', hidden web code, Apple, Ravi Borgaonkar
Industrial Ethernet switches and other devices produced by industrial networking equipment manufacturer RuggedCom contain a vulnerability that could be exploited to compromise SSL-based communications between them and their users,according ...
Tags: Industrial Ethernet, ICS-CERT, SSL, security, vulnerability
Computerworld - Microsoft on Wednesday released a stopgap defense that protects Internet Explorer (IE) against attacks until the company issues a patch on Friday. The update will fix five flaws, including one revealed by a security ...
The unique identifiers of 1 million Apple iOS devices that hackers leaked last week were stolen from the servers of a Florida-based digital publishing firm called Bluetoad. Bluetoad develops digital distribution technologies. Its ...
Tags: Apple iOS devices, US, Cybercrime, Hacking
The CEO of a small Florida publishing company has suggested that it was the source of a leak of one-million-plus Apple users'personal details,which hacking group Anonymous had attributed to the compromised Dell laptop of FBI agent ...
Microsoft today said it will issue two security updates next week for its Visual Studio development platform and its System Center Configuration Manager, the company's enterprise patch and software distribution console. The ...
Tags: Microsoft, USA, security updates, malware, vulnerabilities
Computerworld - Siemens is working on a fix for a remotely exploitable vulnerability in network routers and switches from subsidiary RuggedCom that are widely deployed in refineries, power substations and other critical infrastructure ...
Tags: Siemens, network routers, ROS, router
A flaw found in Apple's iPhone that can allow text messages to sidestep Apple's safeguard is"severe",according to an iPhone security researcher. In a blog post,the researcher,named Pod2g,said that the issue could mean that cyber criminals ...
Tags: iPhone SMS security flaw, iPhone security researcher, blog post Pod2g
In what it says is an attempt to turn the tables on malicious hackers,security vendor Prolexic on Tuesday released details of vulnerabilities it has discovered in a toolkit family used by hackers to launch distributed denial of service ...
Tags: security vendor Prolexic, vulnerability, malicious hackers, DDoS
Security researcher Jonathan Brossard created a proof-of-concept hardware backdoor called Rakshasa that replaces a computer's BIOS (Basic Input Output System) and can compromise the operating system at boot time without leaving traces on ...
Tags: Hardware, Basic Input Output System, computer technology, Brossard
Security researchers released two tools at the Defcon security conference that can be used to crack the encryption of any PPTP (Point-to-Point Tunneling Protocol) and WPA2-Enterprise (Wireless Protected Access) sessions that use MS-CHAPv2 ...
Tags: Microsoft, PPTP, US, Cyberwarfare
Microsoft today launched a security toolkit preview that includes anti-exploit technologies created by one of the three finalists in the company's$250,000 BlueHat Prize contest. Enhanced Mitigation Experience Toolkit(EMET)3.5 features new ...
Tags: Microsoft, anti-exploit tool, security toolkit preview, Las Vegas, EMET