Saturday, October 4th, 2014
Names, addresses, phone numbers and email addresses of the holders of some 83 million households and small business accounts were exposed when computer systems at JPMorgan Chase & Co (JPM.N) were recently compromised by hackers, making it one of the biggest data breaches in history.
The bank revealed the scope of ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, September 24th, 2014
A security vulnerability in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems, could leave systems running those operating systems open to exploitation by specially crafted attacks. “This issue is especially dangerous as there are many possible ways Bash can be called ...
Posted in Internet, Linux, Security | No Comments
Wednesday, September 17th, 2014
Researchers are warning Android users of a major vulnerability that impacts a vital browser security mechanism called Same-Origin Policy (SOP).
The bug – called a “privacy disaster” by Tod Beardsley, an engineering manager at Rapid7 who blogged about the issue Monday – is serious because SOP, “the cornerstone of web privacy,” ...
Posted in Mobile, Privacy, Security | No Comments
Wednesday, September 10th, 2014
One of the unfortunate realities of the Internet today is a phenomenon known in security circles as “credential dumps”—the posting of lists of usernames and passwords on the web. We’re always monitoring for these dumps so we can respond quickly to protect our users. This week, we identified several lists ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, September 2nd, 2014
If you haven’t been following the most recent news regarding a wide swath of celebrities whose accounts were hacked and private photos shared, you must have been having a lot of fun on Labor Day and I salute you.
Probably the very first thing most of the victimized celebrities are doing ...
Posted in Internet, Mobile, Privacy, Security | No Comments