The Samsung Galaxy S3 can be hacked via NFC, allowing attackers to download all data from the Android smartphone, security researchers demonstrated during the Mobile Pwn2Own contest in Amsterdam on Wednesday. Researchers from security ...
Tags: Samsung, Galaxy S3, NFC, Mobile Pwn2Own competition
Trend Micro has updated its mobile security software to detect potential attacks on several Samsung Electronics devices that have a flaw that could allow a malicious application to access all of the phone's memory. The company's Mobile ...
Tags: Samsung, Trend Micro, mobile security software, Mobile Security product
Pwnie Express, a Vermont cybersecurity startup, and creator of the Pwn Plug, the first-to-market penetration testing drop box, will unveil two new pentesting products at Black Hat USA 2012 and Defcon 20. Black Hat is being from July 21-26 ...
Tags: Pwnie Express, cybersecurity, penetration testing drop box, company news
Details have emerged of an extraordinary attack in which millions of DSL broadband routers in Brazil were hit by a serious software flaw that allowed criminals to gain complete control of all web traffic running through them. First ...
Tags: Broadcom chipset, cyber attacks, DNS, malware, broadband routers
About 200 Android applications currently hosted on Google Play create spoofed SMS messages on the devices they are installed on, according to security researchers from antivirus vendor Symantec. This technique can theoretically be used ...
Microsoft yesterday warned Windows users of possible "man-in-the-middle" attacks able to steal passwords for some wireless networks and VPNs, or virtual private networks. It won't issue a security update for the problem, however. The ...
Tags: Microsoft, Windows users, attacks, passwords, wireless networks, VPNs
A U.K. analytics firm that warned earlier this week of an information leak in Internet Explorer (IE) today rebuked Microsoft for downplaying the bug. Microsoft, however, has announced it is working on a fix, although the nature of the ...
Tags: Computer Products, Mouse Tracking, Microsoft, IE
A novel technique based on MapReduce could let hackers hijack computing resources used by cloud-based mobile browsers and use them anonymously, according to security researchers from North Carolina State University and the University of ...
Tags: cloud computing, Mobile browser hack, mobile device threat, smartphone
Attackers can abuse the way browsers and other applications handle steam:// protocol URLs in order to exploit serious vulnerabilities in the Steam client or games installed through the platform, according to researchers from startup ...
Tags: attackers, browsers, applications, URL, vulnerabilities
Oracle is planning to deliver 88 security fixes next Tuesday for a wide range of its products, according to a pre-release announcement posted to its website on Thursday. A number of the bugs affect more than one product, and customers are ...
Tags: Oracle, security fixes, products, Computer Products
Popular online social networking site Tumblr was ravaged on Monday by an Internet worm that spewed racist and inflammatory messages across thousands of user accounts. The malicious hacking group known as GNAA claimed responsibility. The ...
Tags: Blog site, cybercrime, hackers, highlightedpost, Malicious attack
Security researchers have proposed several methods for users to protect their computers from ongoing attacks that target a new and yet-to-be-patched vulnerability in all versions of Java Runtime Environment 7. Most of the proposed ...
Tags: security researchers, methods, ongoing attacks, vulnerability, Java
A new tool allows Mac OS X attackers with root OS access to easily steal the keychain password data of logged in users and reinforces the dangers of granting administrative privileges to applications without serious consideration. The ...
Tags: Apple, hackers, Keychain data, Mac OS X
Attacks targeting an unpatched vulnerability in the latest versions of Java 7 have become widespread after an exploit for the new flaw was integrated into the popular Blackhole attack toolkit, according to security researchers from ...
Tags: Java 7, unpatched vulnerability, attacks, exploit for flaw
About five years ago Genomic Health began to introduce cloud-based business applications. Ken Stineman, senior director of enterprise architecture and security, quickly became aware of the security risks these apps posed. CSO contributor ...
Tags: Genomic Health, cloud business applications, security, apps