Sunday, July 21st, 2013
Smartphones are susceptible to malware and carriers have enabled NSA snooping, but the prevailing wisdom has it there’s still one part of your mobile phone that remains safe and un-hackable: your SIM card.
Yet after three years of research, German cryptographer Karsten Nohl claims to have finally found encryption and software flaws that could affect millions of ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Tuesday, June 4th, 2013
Google security expert Tavis Ormandy has discovered a security vulnerability in Windows which can be exploited by any user on the system to obtain administrator privileges. Rather than reporting the vulnerability to Microsoft, he posted details to the Full Disclosure security mailing list in mid-May and has now published an exploit to the same ...
Posted in Security, Windows | No Comments
Tuesday, May 7th, 2013
The hacker collective "Hack the Planet" (HTP) has claimed responsibility for an attack on MIT (Massachusetts Institute of Technology) computer systems in late January, in which it claims to have briefly taken control of the university's domain, redirected email traffic, and obtained administrator access to all .edu domains. HTP also claims to ...
Posted in Internet, Privacy, Security | No Comments
Sunday, May 5th, 2013
Internet Explorer 8 is still the most-used version of Microsoft's web browser family, according to data from Net Applications. Late Friday, Microsoft posted word that it had discovered an exploit in the browser but noted the issue issue does not appear to affect any other versions.
Microsoft's Security blog states the exploit could ...
Posted in Internet, Security, Windows | No Comments
Monday, November 19th, 2012
Blackhole, says Christopher Boyd, senior threat researcher at GFI Software, “is the chameleon of internet threats. It simplifies the process of creating cybercrime campaigns and is easily adapted to take advantage of the buzz surrounding major news events and popular brands.” It is also easily adapted to target specific users ...
Posted in Internet, Privacy, Security, Software | No Comments