Friday, May 2nd, 2014
Following in the steps of the OpenSSL vulnerability Heartbleed, another major flaw has been found in popular open-source security software. This time, the holes have been found in the log-in tools OAuth and OpenID, used by many websites and tech titans including Google, Facebook, Microsoft, and LinkedIn, among others.
Wang Jing, ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, April 30th, 2014
For users who are not system administrators, the biggest impact of the Heartbleed vulnerability has been all the passwords that they have had to change. This, together with improvements in alternative authentication methods (like the fingerprint scanners now embedded in flagship smartphones), have caused some rather bold statements about passwords to ...
Posted in Internet, Privacy, Security | No Comments
Friday, March 21st, 2014
There are various ways to protect a wireless network. Some are generally considered to be more secure than others. Some, such as WEP (Wired Equivalent Privacy), were broken several years ago and are not recommended as a way to keep intruders away from private networks. Now, a new study published ...
Posted in Internet, Networking, Privacy, Security | No Comments
Monday, February 17th, 2014
Technical details about a vulnerability in Linksys routers that's being exploited by a new worm have been released Sunday along with a proof-of-concept exploit and a larger than earlier expected list of potentially vulnerable device models.
Last week, security researchers from the SANS Institute's Internet Storm Center identified a self-replicating malware ...
Posted in Hardware, Internet, Networking, Security | No Comments
Monday, October 14th, 2013
A security researcher this weekend discovered a backdoor vulnerability with certain D-Link routers that might allow cyber criminals to alter a router's setting without a username or password.
In a note on its website, D-Link said it is "proactively working with the sources of these reports as well as continuing to review ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Page 3 of 14«12345...10...»Last »