-
+19 +11 billion computer monitors vulnerable to undetectable firmware attacks
malware on your computer can poison your monitor's firmware, creating nearly undetectable malware implants that can trick users by displaying fake information, and spy on the information being sent to the screen.
-
+6 +1Can Facts Slow The DNC Breach Runaway Train?
“No, no! The adventures first, explanations take such a dreadful time.” (Lewis Carroll)
-
+36 +1The Internet Of Things Is a Security And Privacy Dumpster Fire And The Check Is About To Come Due
It's a sector where countless companies were so excited to develop, market and sell new "smart" appliances, they couldn't be bothered to embrace even the most rudimentary security and privacy standards once these devices were brought online.
-
+35 +1Edward Snowden’s New Research Aims to Keep Smartphones From Betraying Their Owners
Working with famed hacker “Bunnie” Huang, Snowden wants to help imperiled journalists and activists fully silence their mobile devices.
-
+17 +1Software flaw puts mobile phones and networks at risk of complete takeover
Code-execution vuln resides in code used in cell towers, radios, and basebands.
-
+10 +1As more vulnerabilities are discovered. Is it time to uninstall antivirus software?
For years everyone has been told that they should run antivirus software on their computer for the best possible protection against the ever growing tide of viruses, trojans and general malware on the…
-
+2 +1There's a Stuxnet Copycat, and We Have No Idea Where It Came From
Although the malware might just be a research project, it still went undetected for some time.
-
+3 +1Why having too many named vulnerability disclosures can be harmful
Creating a logo and marketing hype as though each bug brings on the end times is harmful. The security community should decide which flaws receive...
-
+19 +2US anti-encryption law is so 'braindead' it will outlaw file compression
Burr-Feinstein's proposed legislation will screw over the NSA, too, says Bruce Schneier
-
+3 +1DROWN Attack
DROWN is a serious vulnerability that affects HTTPS and other services that rely on SSL and TLS, some of the essential cryptographic protocols for Internet security. These protocols allow everyone on the Internet to browse the web, use email, shop online, and send instant messages without third-parties being able to read the communication.
-
+14 +1Even With Telemetry Disabled, Windows 10 Talks To Dozens of Microsoft Servers
I decided to do my own investigating on what, exactly, Windows 10 is doing traffic-wise, and post the results. For this analysis, I wanted to simply analyse the network traffic of Windows 10 on a clean install, and just let it sit and run without using it. Here is the roughly 8-hour network traffic analysis of 5508 connection attempts of an unused, base install of Windows 10 Enterprise.
-
+32 +4All your old-tech passwords belong to us, for just $17
A $17 tool called CloudCracker is the latest reminder of the cybersecurity risk in the cloud.
-
+3 +1How Amazon customer service was the weak link that spilled my data
Even when doing everything right, an Amazon account is all it takes to get breached.
-
+1 +1Keybase - 4 Invites Available.
Get a public key, safely, starting just with someone's social media username(s). Lets bring this tribe back! I'm going to go to sleep and will add the first 4 requests I get.
-
+23 +3The most common passwords of 2015 are a reminder to up your online security game
At a time when cyber attacks are ever more common, with personal data becoming a commodity, you might imagine that people would have learned their lessons at the expense of nude photo hackings and Ashley Madison data dumping. But as this list of 2015’s most popular passwords goes to show, most of us still like the convenience of something incredibly easy to remember – and even easier to guess.
-
+20 +2Your broadband router is not as secure as you think it is
New research has found the firmware that runs most broadband routers is years out of date and riddled with potential security holes.
-
+24 +2Opinion: Why we all have a stake in encryption policy
Rapid advances in technology could soon turn science fiction notions of effortless encryption into a reality. But ensuring that we can trust that technology will take more public vigilance against government and corporate eavesdropping.
-
+2 +1DDoS Mitigation Skills Are In Demand | Incapsula.com
With the number of DDoS attacks on websites on the rise, companies are looking for network and security professionals who can lead in-house DDoS mitigation efforts.
-
-1 +1Attackers Infect Cisco Routers with "SYNful Knock" Backdoor to Steal Data | Hacked
Security researchers at FireEye have discovered attackers siphoning data from networks by infecting Cisco routers through a backdoor malware.
-
+19 +2Hack Brief: Emergency-Number Hack Bypasses Android Lock Screens
A new lock screen bypass technique requires little more than typing a long string of characters and repeatedly pressing the camera shutter button.
Submit a link
Start a discussion




















