Hackers of the world,unite!You have nothing to lose but the lousy stock firmware your routers shipped with. Apart from smartphones,routers and wireless base stations are undoubtedly the most widely hacked and user-modded consumer ...
Tags: DD-WRT, Vyatta, security, Hackers, routers, Tomato, OpenWRT, M0n0wall, PfSense
A 16-year-old security researcher from India plans to present a malware application for Windows Phone 8 at the upcoming MalCon security conference in New Delhi,India,on Nov.24. According to a brief description of the presentation on the ...
Tags: MalCon security conference, malware application, Windows Phone 8
Microsoft today patched 19 vulnerabilities in Windows,Internet Explorer 9(IE9),Excel and the.Net development framework,including four flaws in the just-released Windows 8 and its tablet spin-off Windows RT. Of Tuesday's six security ...
Tags: Microsoft, vulnerabilities, Windows, IE9
Nearly two-thirds of UK citizens back pre-emptive cyber strikes on foreign states that pose a credible threat to national security,a survey has revealed. However,46%of those believe it depends on the level of threat posed,according to a ...
Tags: UK citizens, cyber strikes, security information event management firm
Twitter has apologised after telling members their accounts had been hacked and forcing them to reset their passwords. Twitter sent out a"large number"of emails telling members to change their log-in details,but gave no indication of the ...
Tags: Twitter, apologises, unnecessary hacking warnings, protect users
Sony said Thursday that the executive in charge of its online products,and linking them up to its broad hardware holdings,will leave the company at the end of the year. The Tokyo-based electronics giant said Tim Schaaff,who it poached ...
Tags: Sony, online exec, Schaaff, online services
Computerworld-The move to allow voters in New Jersey to cast their votes via email or fax may be running into early problems,according to reports. BuzzFeed this morning reported that voters in New Jersey's Morris and Essex Counties were ...
Tags: Email Voting, N.J., Sparks Security, fax
It's not exactly the type of advertisement most people would understand. For sale:"Our first 0day for Win8+IE10 with HiASLR/AntiROP/DEP&Prot Mode sandbox bypass(Flash not needed)."It's part of a recent message on Twitter from Vupen,a ...
Tags: Windows 8, Zero-Day Vulnerability, Vupen, computer security research
One-quarter of more than 400,000 Android apps examined in the Google Play store pose security risks to mobile-device users,according to new research. SECURITY:Android malware market exploding,says Trend Micro Security vendor Bit9 ...
Tags: Security Research, Android apps, mobile-device, Google Play
MPs have told Home Secretary Theresa May that the Communications Data Bill represents a huge invasion of privacy that could be exploited by criminals. May appeared in front of the Commons Select Committee scrutinising the controversial ...
Tags: MPs, Home Secretary, Communications Data Bill, Data security
While the risk of being hacked,conned or having sensitive information stolen is possible all through the year,most security experts agree that the holiday season brings a spike in fraudulent activity,both online and off. CSO compiled a ...
Tags: Christmas, Fraudulent auction, payment sites
Some Web browsers can be tricked into using so-called malicious extensions that can give hackers the ability to hijack the user's session,spy on webcams,upload and download files,and in the newer mobile-device area,hack into Google Android ...
Tags: zombie browsers, malicious extensions, advanced persistent threat, Chrome
Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft,data theft,snooping,impersonation and malware infection.That's why so many people rely on public virtual private network services,but VPNs are no ...
Tags: Computer, VPN, public Wi-Fi hotspot, security
IDG News Service-In one of the photos,the dark-haired,bearded hacker is peering into his computer's screen,perhaps puzzled at what's happening.Minutes later,he cuts his computer's connection,realizing he has been discovered. The nation of ...
Tags: Georgia, cyber-spying, Russia-Based Hacker
CSO-In Windows 8,Microsoft has greatly improved the operating system's ability to detect malware before it has a chance to run,experts say.Windows 8 should also make it more difficult for people to unknowingly install malware in the first ...