Friday, July 19th, 2013
At the Black Hat conference in Las Vegas, researchers will reveal critical vulnerabilities in many of the world’s most widely-used building security systems and RFID‑based badging systems.
Bishop Fox Senior Security Analysts Drew Porter and Stephen Smith and Partner Fran Brown will be presenting two separate talks that showcase methods of ...
Posted in Hardware, Privacy, Security | No Comments
Friday, July 19th, 2013
85 percent of U.S. adults with banking accounts are at least somewhat concerned about online banking fraud, according to Entersekt. Such fraud can include phishing, malware, man-in-the-browser and brute force attacks.
While concern is worth noting, it is action that impacts the ultimate health of a financial institution. Seventy-one percent of ...
Posted in Internet, Privacy, Security | No Comments
Friday, July 12th, 2013
Computer manufacturer HP has admitted that its StoreVirtual servers also contain an undocumented backdoor. The security vulnerability risks allowing attackers to gain unauthorised access to the storage systems. The backdoor provides users with direct access to the holy of holies, "LeftHand" (the operating system for the StoreVirtual server). HP has ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Tuesday, May 7th, 2013
The hacker collective "Hack the Planet" (HTP) has claimed responsibility for an attack on MIT (Massachusetts Institute of Technology) computer systems in late January, in which it claims to have briefly taken control of the university's domain, redirected email traffic, and obtained administrator access to all .edu domains. HTP also claims to ...
Posted in Internet, Privacy, Security | No Comments
Monday, November 19th, 2012
Blackhole, says Christopher Boyd, senior threat researcher at GFI Software, “is the chameleon of internet threats. It simplifies the process of creating cybercrime campaigns and is easily adapted to take advantage of the buzz surrounding major news events and popular brands.” It is also easily adapted to target specific users ...
Posted in Internet, Privacy, Security, Software | No Comments