Network security is still as necessary as it was 15 years ago when the Black Hat Conference was first beginning. Sure the players have changed and the sophistication, but it is a classic good vs. evil scenario still. A panel of experts at ...
Tags: Network, security, Black Hat Conference
IDG News Service - Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6 -- in order to infect computers with malware, according to researchers from security vendor FireEye. ...
IDG News Service - Java vulnerabilities are increasingly exploited by attackers to infect computers, and the problem could become worse if Oracle doesn't do more to secure the product and keep its installation base up to date, according to ...
Tags: Java vulnerabilities, computers, Oracle, Flash Player, Adobe Reader
IDG News Service - Cybercriminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. ...
Tags: Cybercriminals, computer, malware, commercial proxy service
Computerworld - Security consulting firm SecureState today released a new open source hacking tool that it claims will let security researchers and penetration testers verify the security of electric utility smart meters being installed in ...
Tags: SecureState, Termineter, OptiGuard, Spencer McIntyre
Security researcher Michael Coppola demonstrated how small and home office (SOHO) routers can be compromised and turned into botnet clients by updating them with backdoored versions of vendor-supplied firmware. Coppola, who is a security ...
Tags: SOHO routers, botnet clients, backdoored versions, firmware
Global Payments, which back in the spring reported a data breach in which information associated with an estimated 1.4 million payment cards was stolen, has revealed that expenses associated with investigations, fines and remediation has ...
Tags: Global Payments, data breach, information, investigations, fines
A top Apple security guru Thursday presented an in-depth view into the security architecture for iOS, the basis of iPhones and iPad tablets, underscoring the complex certificate-based encryption framework Apple has adopted. Our attitude ...
Tags: Apple, security guru, iOS, iPhones, iPad tablets, crypto architecture
A researcher scored again against Oracles database by demonstrating at the Black Hat security conference Thursday an exploit that would allow him to take control as an administrator. David Litchfield, a researcher at Accuvant Labs, demoed ...
Tags: Oracles database, Black Hat, security conference, David Litchfield
Pwnie Express, a Vermont cybersecurity startup, and creator of the Pwn Plug, the first-to-market penetration testing drop box, will unveil two new pentesting products at Black Hat USA 2012 and Defcon 20. Black Hat is being from July 21-26 ...
Tags: Pwnie Express, cybersecurity, penetration testing drop box, company news
Cyber criminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. Three months ...
Tags: Black Market, malware, Proxy, Symantec, Computers
The U.N.’s civil aviation body will recommend creating a cyber security task force at a meeting next week in Canada, as new technologies introduced into aviation systems are increasing the risk of cyber attacks. The International ...
Tags: cyber security, UN, United Nations, new technologies, cyber
Apple has quietly hired Kristin Paget, a former Microsoft security expert who worked as a hacker for the company to resolve Windows Vista vulnerabilities, to work on its Mac OS X security team. According to her LinkedIn profile, Paget ...
Security threats to your mobile device such as malware, fraudulent lures such as SMS spoofing, and toll fraud, are all becoming favourites of digital crooks as people move away from using PCs and toward smartphones and tablets, according to ...
Tags: cybercrime, mobile devices, mobile security, PC, tablet
Security researchers have presented proof-of-concept code capable of accessing the database driving a Microsoft ERP system and then diverting funds while avoiding immediate detection. Tom Eston and Brett Kimmel of vendor SecureState ...
Tags: highlightedpost, Microsoft, Microsoft ERP, Security researchers