Monday, February 17th, 2014
Technical details about a vulnerability in Linksys routers that's being exploited by a new worm have been released Sunday along with a proof-of-concept exploit and a larger than earlier expected list of potentially vulnerable device models.
Last week, security researchers from the SANS Institute's Internet Storm Center identified a self-replicating malware ...
Posted in Hardware, Internet, Networking, Security | No Comments
Saturday, February 15th, 2014
On Wednesday night, law enforcement officials contacted Kickstarter and alerted us that hackers had sought and gained unauthorized access to some of our customers' data. Upon learning this, we immediately closed the security breach and began strengthening security measures throughout the Kickstarter system.
No credit card data of any kind was accessed ...
Posted in Internet, Privacy, Security | No Comments
Saturday, February 15th, 2014
Cyber criminals used data from previous high-profile hacks to break into thousands of Tesco.com accounts.
In total, 2,239 customers are said to have been affected by the incident, which first came to light on Thursday night, as reported by the BBC when it was contacted by some of the affected customers.
Customers reported seeing ...
Posted in Internet, Privacy, Security | No Comments
Thursday, February 13th, 2014
Dozens of self-signed SSL certificates created to impersonate banking, e-commerce and social networking websites have been found on the Web. The certificates don't pose a big threat to browser users, but could be used to launch man-in-the-middle attacks against users of many mobile apps, according to researchers from Internet services ...
Posted in Internet, Mobile, Privacy, Security | No Comments
Thursday, February 13th, 2014
A useful cyber-defensive utility can be turned into a powerful tool for cyber-attackers in the form of full access to millions of users' computers, according to research from Kaspersky Lab regarding an element of Absolute Software’s anti-theft software.
The focus of the Kaspersky research was the Absolute Computrace agent that resides ...
Posted in Hardware, Internet, Privacy, Security | No Comments