Researchers showed a Black Hat audience how femotcell technology, used by phone companies to boost cell phone coverage, can be hacked to intercept cell phone calls, text messages and other data. Tom Ritter and Doug DePerry , researchers ...
Tags: Phone Calls, Exploit Cellular Tech
Facebook turned on a key security feature by default on Wednesday that scrambles data sent by users to the company's servers, following similar moves in recent years by Web services such as Google and Twitter. Two years ago, the social ...
Tags: Facebook, Secure Browsing
Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps. The ICS ...
Google has announced the company is in the process of migrating its SSL [Secure Sockets Layer] certificates from 1024-bit to 2048-bit levels of encryption. Google Identity Team's Tim Bray describes the decision as "part of our continuous ...
Tags: SSL Certificates, google
A talk promising to reveal security shortcomings of modern cars’ electronic network systems will be presented at the DefCon 21 hacking conference in Las Vegas next month. To be presented by Twitter security engineer Charlie Miller ...
Tags: Car Security
USERS of Linux who subscribe to the online forums of popular strain Ubuntu have been urged to change their passwords after hackers stole up to 1.82 million user names and passwords. This especially applies to Linux users who use the ...
Stephen Balaban, the 24-year-old founder of Lambda Labs, has created "an alternative operating system that runs on Glass but is not controlled by Google," he told NPR's Steve Henn. Though Google has banned facial recognition software ...
Tags: Glass, Google Glass, Consumer Electronics, google
Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organisations because most of them have outdated versions of the software ...
Tags: Java, soft security, software, Computer Products
As SAP invests heavily in mobile, a security testing company will release a tool next month to ensure mobile-accessible SAP systems are not vulnerable to hackers. Boston-based Onapsis will release a new module for its X1 security suite, a ...
Tags: SAP systems, Computer Products, software
The government is to review Huawei's Cyber Security Evaluation Centre (the Cell) and will report its findings later in the year. The Chinese telecommunications firm, which has flourished on a global scale in recent years, has been ...
Tags: Computer Products, huawei
New research has shown that the vast majority of businesses are exposing sensitive corporate data to cyber-criminals by failing to implement effective BYOD strategies. The report, released this week, found that just over half of the 570 ...
Tags: Computer Products, software
Security researchers from Polish vulnerability research firm Security Explorations claim to have identified a new vulnerability in Java 7 that could allow attackers to bypass the software's security sandbox and execute arbitrary code on the ...
Tags: Computer Products, software
One of the biggest challenges facing the IT industry is determining how to boost the number of skilled cyber security professionals in order to combat an epidemic of cyber crime. That's according to Jon Ramsey, CTO of Dell SecureWorks, the ...
Tags: Security Skills, DELL, Computer Products, IT
The Chinese cyber-spies behind the widely publicised espionage campaign against?The New York Times?have added Dropbox and WordPress to their bag of spear-phishing tricks. The gang, known in security circles as the DNSCalc gang, has been ...
Tags: Computer Products, software
Some of the biggest technology, telecommunications and security firms will share cyber threat intelligence with the government to help increase the security of the defence supply chain, as part of a new government scheme. The scheme ...
Tags: Computer Products, software