A skeptical but mostly respectful crowd of Black Hat security attendees Wednesday listened intently as National Security Agency Director Keith Alexander defended controversial U.S. surveillance programs in a keynote address. The nearly ...
Tags: NSA Spy Programs
A talk promising to reveal security shortcomings of modern cars’ electronic network systems will be presented at the DefCon 21 hacking conference in Las Vegas next month. To be presented by Twitter security engineer Charlie Miller ...
Tags: Car Security
Online grocery retailer Ocado is “playing with fire” as it negotiates a deal with Morrisons, which is eyeing a late entry into the online market, analysts have warned. Ocado has been accused of 'playing with fire' as it ...
Tags: Ocado, grocery retailer, Food
Online grocery retailer Ocado is “playing with fire” as it negotiates a deal with Morrisons, which is eyeing a late entry into the online market, analysts have warned. Ocado has been accused of 'playing with fire' as it ...
The head of the US National Security Agency (NSA) and Cyber Command, created to defend against internet-based attacks, has called on hackers to help make the web more secure. General Keith Alexander emphasised the common ground between US ...
Tags: hackers, National Security Agency, US, internet-based attacks
Huawei Technologies said on Thursday it was verifying claims that its routers contained critical vulnerabilities, after security researchers disclosed alleged problems last weekend. "We are aware of the media reports on security ...
Tags: Huawei Technologies, routers, critical vulnerabilities, security
Security researcher Michael Coppola demonstrated how small and home office (SOHO) routers can be compromised and turned into botnet clients by updating them with backdoored versions of vendor-supplied firmware. Coppola, who is a security ...
Tags: SOHO routers, botnet clients, backdoored versions, firmware
Security researchers disclosed critical vulnerabilities in routers from Chinese networking and telecommunications equipment manufacturer Huawei at the Defcon hackers conference on Sunday. The vulnerabilities -- a session hijack, a heap ...
Tags: critical vulnerabilities, Huawei, Defcon, security
Pwnie Express, a Vermont cybersecurity startup, and creator of the Pwn Plug, the first-to-market penetration testing drop box, will unveil two new pentesting products at Black Hat USA 2012 and Defcon 20. Black Hat is being from July 21-26 ...
Tags: Pwnie Express, cybersecurity, penetration testing drop box, company news
Microsoft yesterday warned Windows users of possible "man-in-the-middle" attacks able to steal passwords for some wireless networks and VPNs, or virtual private networks. It won't issue a security update for the problem, however. The ...
Tags: Microsoft, Windows users, attacks, passwords, wireless networks, VPNs
The U.S. Air Force is openly soliciting technologies that would improve its capability of launching cyberattacks and gathering intelligence during cyberwarfare operations. "The Air Force Life Cycle Management Center invites concept papers ...
Tags: U.S., Air Force, soliciting technologies, cyberwarfare capabilities
Apple has quietly hired Kristin Paget, a former Microsoft security expert who worked as a hacker for the company to resolve Windows Vista vulnerabilities, to work on its Mac OS X security team. According to her LinkedIn profile, Paget ...
Equity Risk Partners (ERP), an insurance brokerage and consulting firm, has established a new practice group to address the insurance requirements of defense, aerospace and government contractors. The newly launched DefCon Risk will ...
Tags: Equity Risk Partners, insurance, government contractors, global insurance
Software made by Siemens and targeted by the Stuxnet malware is still full of other dangerous vulnerabilities,according to Russian researchers whose presentation at the Defcon security conference earlier this year was cancelled following a ...
Tags: Siemens software, Stuxnet, Sergey Gordeychik, SCADA system
Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft,data theft,snooping,impersonation and malware infection.That's why so many people rely on public virtual private network services,but VPNs are no ...
Tags: Computer, VPN, public Wi-Fi hotspot, security