Wednesday, September 24th, 2014
A security vulnerability in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems, could leave systems running those operating systems open to exploitation by specially crafted attacks. “This issue is especially dangerous as there are many possible ways Bash can be called ...
Posted in Internet, Linux, Security | No Comments
Wednesday, September 10th, 2014
One of the unfortunate realities of the Internet today is a phenomenon known in security circles as “credential dumps”—the posting of lists of usernames and passwords on the web. We’re always monitoring for these dumps so we can respond quickly to protect our users. This week, we identified several lists ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, September 2nd, 2014
If you haven’t been following the most recent news regarding a wide swath of celebrities whose accounts were hacked and private photos shared, you must have been having a lot of fun on Labor Day and I salute you.
Probably the very first thing most of the victimized celebrities are doing ...
Posted in Internet, Mobile, Privacy, Security | No Comments
Tuesday, September 2nd, 2014
Multiple banks say they are seeing evidence that Home Depot stores may be the source of a massive new batch of stolen credit and debit cards that went on sale this morning in the cybercrime underground. Home Depot says that it is working with banks and law enforcement agencies to ...
Posted in Internet, Privacy, Security | No Comments
Friday, August 22nd, 2014
University researchers have built an Android app that secretly snatches valuable personal data from other mobile apps, such as webmail, shopping and online banking.
The app, demonstrated Friday at the USENIX Security Conference in San Diego, stole login credentials from Google Gmail, a social security number from an H&R Block app, ...
Posted in Internet, Mobile, Privacy, Security | No Comments