Wednesday, February 19th, 2014
Smart home networks are rapidly gaining popularity, but some security experts worry that not enough encryption controls are coming with the products.
Security firm IOActive released an advisory (PDF) on Tuesday saying more than half a million Belkin WeMo devices are susceptible to widespread hacks. The firm uncovered several vulnerabilities in these devices, ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Monday, February 17th, 2014
Technical details about a vulnerability in Linksys routers that's being exploited by a new worm have been released Sunday along with a proof-of-concept exploit and a larger than earlier expected list of potentially vulnerable device models.
Last week, security researchers from the SANS Institute's Internet Storm Center identified a self-replicating malware ...
Posted in Hardware, Internet, Networking, Security | No Comments
Thursday, February 13th, 2014
A useful cyber-defensive utility can be turned into a powerful tool for cyber-attackers in the form of full access to millions of users' computers, according to research from Kaspersky Lab regarding an element of Absolute Software’s anti-theft software.
The focus of the Kaspersky research was the Absolute Computrace agent that resides ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Friday, January 31st, 2014
Everyone typically beats up on Android for posing a security risk, with its third-party app stores and Google’s open access policies. But Apple iOS is not entirely above the fray, as a new proof-of-concept (PoC) “screenlogging” malware shows.
Neal Hindocha, a senior security consultant for Trustwave, is planning to demonstrate a ...
Posted in Hardware, Mobile, Privacy, Security | No Comments
Saturday, January 18th, 2014
Cybercriminals have stolen payment card data from six more U.S. retailers using similar point-of-sale malware that compromised Target, a computer crime intelligence company said Friday.
The conclusion comes from a study of members-only forums where cybercriminals buy and sell data and malicious software tools, said Dan Clements[cq], president of IntelCrawler, which ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments