President Barack Obama signed into law H.R. 4007, the Protecting and Securing Chemical Facilities from Terrorist Attacks Act of 2014. The law reauthorizes the Department of Homeland Security’s (DHS) Chemical Facility Anti-Terrorism ...
Tags: tiering methodology, Construction
A security vulnerability that affects nearly one billion Android handsets has been outed by a security expert. Tod Beardsley, an analyst with Rapid7, claims that all Android versions below Android 4.4 KitKat are affected by the ...
Tags: Android Bug, Consumer Electronics, BGR
Pessimists are fond of saying that no good deed goes unpunished. An Australian teenager who reported a security vulnerability in a government website and now faces legal troubles probably agrees. Joshua Rogers, a 16-year-old Victoria ...
Tags: Consumer Electronics, Electronics
Israeli researchers at Ben-Gurion University of the Negev (BGU) said a security flaw was discovered by a team member, a PhD student, and that this vulnerability could enable interception of data on Samsung mobile devices based on the Knox ...
The National Security Agency can retain communications of U.S. citizens or residents potentially indefinitely if those communications are encrypted, according to a newly leaked secret government document. The document describes the ...
Tags: NSA, Encrypted Communications
A hacker has apparently taken down the Virgin Radio Dubai website. The hacker, who goes by the username @OxAlien on Twitter, posted up a picture of his screen as he was apparently removing the link to the website on Monday night. The ...
Tags: Virgin Radio Dubai, Database, Hacker
A 17-year-old German student contends PayPal has denied him a reward for finding a vulnerability in its website. Robert Kugler said he notified PayPal of the vulnerability on May 19. He said he was informed by email that because he is ...
Tags: Computer Products, software
Intruders used to creep in through ventilation ducts. Now they break in using the software that controls the ventilation. Hundreds of organizations across Australia are using out-of-date industrial control systems (ICS) to control the ...
The PostgreSQL developers released updates for all major branches of the popular open-source database system on Thursday in order to address several vulnerabilities, including a high-risk one that could allow attackers to crash the server, ...
Tags: PostgreSQL, Computer Products
Tripwire today said it had acquired nCircle for an undisclosed price, a deal that will meld together two longtime rivals in the security and vulnerability-management industry. Tripwire, which had been acquired by investment firm Thoma ...
Tags: Security vulnerability, nCircle, Network
A Polish security firm known for rooting out Java vulnerabilities has reported two new bugs in the browser plug-in to Oracle, Security Explorations said today. On its bug-reporting status page, Security Explorations noted that it had ...
Tags: Java vulnerabilitie, Oracle, company news
Microsoft and a respected researcher disagreed this week about whether a bug in Windows RT is actually a security vulnerability that should be patched. The bug, revealed Jan. 5 by a hacker known as "clrokr," can be used to bypass a ...
Tags: Microsoft, bug, Windows RT
Security experts have flagged a zero-day exploit in Oracle's Java software,urging users to disable it to prevent hackers remotely controlling their computers. "Java is a mess.It's not secure,"said James Blasco,labs manager for internet ...
Tags: Java, security expert, hacker, Windows 7
IDG News Service - A new tool allows Mac OS X attackers with root OS access to easily steal the keychain password data of logged in users and reinforces the dangers of granting administrative privileges to applications without serious ...
Tags: OS X, software, keychain, keychaindump
Popular online social networking site Tumblr was ravaged on Monday by an Internet worm that spewed racist and inflammatory messages across thousands of user accounts. The malicious hacking group known as GNAA claimed responsibility. The ...
Tags: social networking, Tumblr, Internet worm, site attack