Security researchers have presented proof-of-concept code capable of accessing the database driving a Microsoft ERP system and then diverting funds while avoiding immediate detection. Tom Eston and Brett Kimmel of vendor SecureState ...
The world is becoming increasingly connected, so the need for security and privacy is integral to modern society says Raj Samani, vice-president and CTO of McAfee Europe. With everything becoming connected, from smart meters to cars, ...
Tags: security, privacy, McAfee Europe
Online Marketing&Public Relations company,Brandlective Communications have announced that they are introducing monthly website audits,following the web spam update,Google Penguin. LONDON,ENGLAND,October 01,2012/24-7PressRelease/--The ...
Tags: Brandlective Communications, monthly website audits, web spam update
Industrial Ethernet switches and other devices produced by industrial networking equipment manufacturer RuggedCom contain a vulnerability that could be exploited to compromise SSL-based communications between them and their users,according ...
Tags: Industrial Ethernet, ICS-CERT, SSL, security, vulnerability
More than 50% of devices running Google's Android mobile operating system (OS) have unpatched vulnerabilities, opening them up to malicious apps and other attacks. Security provider Duo Bulletin assessed 20,000 Android devices worldwide ...
Tags: operating system, mobile, Android, unpatched vulnerabilities
Security firm Entrust has announced that it is withdrawing from a voluntary online security standards organisation that it co-founded and co-chaired for six years. The move follows the introduction of a mandatory Intellectual Property ...
Tags: SSL, CA/Browser Forum, Security firm, the IPR policy
Security researcher Jonathan Brossard created a proof-of-concept hardware backdoor called Rakshasa that replaces a computer's BIOS (Basic Input Output System) and can compromise the operating system at boot time without leaving traces on ...
Tags: Hardware, Basic Input Output System, computer technology, Brossard
Network World - LAS VEGAS -- To celebrate the 15th anniversary of the Black Hat Conference here, a panel of experts got together to expound on what they see as the privacy and security mess of our times, and they had plenty to say about the ...
Tags: U.S., Google, Conference
Retail chip and PIN devices can be attacked easily,exposing banks,retailers and customers to fraud. Researchers from Basingstoke-based MWR InfoSecurity demonstrated at the 2012 Black Hat conference in Las Vegas that it is possible to ...
Tags: Retail chip and PIN devices, MWR Infosecurity, 2012 Black Hat, Las Vegas
Microsoft today launched a security toolkit preview that includes anti-exploit technologies created by one of the three finalists in the company's$250,000 BlueHat Prize contest. Enhanced Mitigation Experience Toolkit(EMET)3.5 features new ...
Tags: Microsoft, anti-exploit tool, security toolkit preview, Las Vegas, EMET
A Black Hat volunteer mistakenly sent to 7,500 conference goers a password-reset email that was initially thought to be a phishing attempt. Organizers of the security conference that started Saturday in Las Vegas, quickly released a ...
Tags: Black Hat, security conference, US, password reset email
Just two weeks before researchers are to disclose bugs in Windows "gadgets" at Black Hat, Microsoft acknowledged unspecified security vulnerabilities in the small pieces of software supported by Vista and Windows 7. To deal with the ...