security experts

security experts

Security Experts Debate If Markets or Legal Liability Will Ensure Secure Software

www.pcworld.com
Consumer desire for unnecessary features has encouraged the development of insecure and unreliable software products, said Tenable Network Security CSO Marcus......
Security Experts Debate If Markets or Legal Liability Will Ensure Secure Software

Update: Hackers exploit new IE zero-day vulnerability

www.computerworld.com
Attackers are exploiting a "zero-day" vulnerability in Microsoft's Internet Explorer and hijacking Windows PCs that cruise to malicious or compromised websites, security experts said today....
Update: Hackers exploit new IE zero-day vulnerability

Der Spiegel says US bugged EU offices in Washington

arstechnica.com
Today, German magazine Der Spiegel reported that it got a look at slides detailing the systematic bugging of European Union offices in the US. The news from the paper cited top-secret documents “that Spiegel has in part seen,” which were dated from 2010 and were recently obtained by Edward Snowden. The...
Der Spiegel says US bugged EU offices in Washington

An App That Encrypts, Shreds, Hashes and Salts

bits.blogs.nytimes.com
Wickr, a new smartphone app, secures text messages, photos and videos using military-grade encryption and never stored. The service camouflages user names and other identifiable information, such as a smartphone's identification number, by appending several random digits to each value, then mashing them up with a mathematical algorithm, a process...
An App That Encrypts, Shreds, Hashes and Salts
We're going to blow up your boiler: Critical bug threatens hospital systems

Java security improvements not a panacea for Oracle

www.pcworld.com
Oracle's plans to bolster Java security were welcomed by security experts who nevertheless wanted to see more done to lockdown one of hackers' favorite targets. The Java steward released on Thursday its priorities for the application platform. The changes on tap included automated checking of the validity of signed...
Java security improvements not a panacea for Oracle

Doubt cast on the security of Kim Dotcom's Mega service

www.pcworld.com
Kim Dotcom's bold new venture, the file-storage and sharing service Mega, is drawing criticism as security researchers analyze how the site protects users' data. In short, they advise: don't trust it. While Mega officials admit they're "newbies" to JavaScript, the programming language used to execute key elements of their...
Doubt cast on the security of Kim Dotcom's Mega service

Not a game: Blizzard's Battle.net was hacked and they want you to change your password

thenextweb.com
If you’re a PC gamer and play World of Warcraft, Diablo or Starcraft, you might want to log into Battle.net and change your password immediately. The company behind it, Blizzard, has confirmed that the site has been hacked. Here’s what Blizzard’s co-founder and President Michael Morhaime had to say about...
Not a game: Blizzard's Battle.net was hacked and they want you to change your password

Warning: Java Zero Day Flaw Under Attack

www.pcworld.com
Attackers have developed an exploit for a zero-day vulnerability in Oracle's Java, and security experts are concerned that widespread attacks are imminent....
Warning: Java Zero Day Flaw Under Attack

Brace for more mega-DDoS attacks, security experts warn

www.cnmeonline.com
Distributed Denial of Service attacks like the one that resulted from an altercation between a Dutch company and Spamhaus last week are on the rise, according to a report by security firm Kaspersky Labs. The security vendor was responding to the huge DDoS attack that occurred last week, described as the biggest cyber...
Brace for more mega-DDoS attacks, security experts warn

iTunes (temporarily) serves porn images to Russian users

arstechnica.com
iTunes users in Russia got an eyeful on Wednesday (hat tip to Wired) when a newly released version of the app displayed graphic images of porn instead of the foreign films they were expecting. The bug, reported to be present in the iTunes Store shown to users in Russia,...
iTunes (temporarily) serves porn images to Russian users

Obama executive order redefines critical infrastructure

www.computerworld.com
President Barack Obama's cybersecurity executive order, signed on Tuesday, could significantly expand the list of companies categorized as part of U.S. critical infrastructure sector, security experts said Wednesday....
Obama executive order redefines critical infrastructure

LulzSec Bust a Blow to Anonymous? Not So Fast

www.pcworld.com
Security experts say it's too early to tell how much damage has been done to the hacking groups that operate under the loose affiliation of Anonymous....
LulzSec Bust a Blow to Anonymous? Not So Fast

Two thirds of Madi cyber espionage targets based in Israel

www.guardian.co.uk
Security experts discover 62% of the approximately 800 victims of malware campaign have been based in IsraelNearly two thirds of the government officials, lobbyists and other victims of the cyber espionage campaign dubbed Madi were based in Israel, security experts have discovered.An investigation by the security firm Symantec, published on...
Two thirds of Madi cyber espionage targets based in Israel

The Hackers Are Winning

readwrite.com
After almost two decades online, I have never been more paranoid about my security, identity and theft. Since the start of 2013, the following has happened: My Twitter password was compromised. So was the password on my Evernote account. My Yahoo email (which I hardly use anymore) was hacked and...
The Hackers Are Winning

Some data-breach victims can't be helped

www.computerworld.com
From the No Good Deed Goes Unpunished Department: Security experts trying to tell a Pennsylvania hospital that a pile of its sensitive data belonging to staff -- and possibly patients -- was sitting exposed on the Internet were stymied for five days recently by the fact that no one at...
Some data-breach victims can't be helped

Why You Don't Need Mac Anti-Virus Software - Plus What You Do Need

www.readwriteweb.com
Most Mac users don't spend much time worrrying about computer viruses, but many companies wonder if they need to install anti-virus software on their corporate Macs. Nope, at least according a recent Forrester Research report that says the performance degradation caused by most AV technology outweighs the malware risks on...
Why You Don't Need Mac Anti-Virus Software - Plus What You Do Need

Iran accused of using online censorship and hacking to sway presidential poll

www.guardian.co.uk
Keyword-based filtering allows blocking of sites and texts containing candidates' names and slogans, say security expertsIranian authorities are mounting a sophisticated campaign of online censorship, hacking attacks and filtering to influence the country's imminent presidential elections, according to reports from people inside the country and security researchers outside.Iranians are finding...
Iran accused of using online censorship and hacking to sway presidential poll

New OS X Trojan identified, bypasses user permissions

www.electronista.com
Security firm Intego's virus team has identified a new Trojan horse targeting the Mac platform. The Trojan, called Crisis, has yet to be seen in the wild, but Intego says it is engineered to make analysis of the malware difficult for security experts. Intego has stresses alertness regarding the new...
New OS X Trojan identified, bypasses user permissions

iOS devices approved for use on US military networks following Samsung and BlackBerry

9to5mac.com
Following reports earlier this month that the Defense Department was in the process of approving iOS 6 for nonclassified communications and widespread use by government agencies, Bloomberg reports today that Apple has officially be granted approval for use on U.S. military networks. The Pentagon already approved Samsung devices powered...
iOS devices approved for use on US military networks following Samsung and BlackBerry

O2 Wallet targets contactless payments market

www.guardian.co.uk
Smartphone app, which aims to simplify online shopping and money transfers, is open to mobile users across all networksMobile operator O2 has become the latest firm to offer a mobile payments service, allowing consumers to use their handset to send money to other people and shop more quickly online.Following in...
O2 Wallet targets contactless payments market

TSA Bad At Security; Leaves Security Status Data On Boarding Passes Unencrypted

www.techdirt.com
You would think, given that "Security" is literally the organization's middle name, that the Transportation Security Administration (TSA) would actually have some sort of clue about the basics of security. Apparently not. This week, someone noticed a ridiculous security flaw in the TSA's pre-screening process for "expedited" lines. This is...
TSA Bad At Security; Leaves Security Status Data On Boarding Passes Unencrypted

A Hacker Says Smart Grid Can Be Penetrated

bits.blogs.nytimes.com
At a computer security conference in Miami, a hacker showed security experts how he was able to intercept the radio communications between Silver Spring Networks, a maker of smart grid technology, and its clients, which include major utilities like Pacific Gas and Electric and Pepco Holdings....
A Hacker Says Smart Grid Can Be Penetrated
Valve says Steam hacker probably has data from old transactions

Security Experts Push Ukraine to Drop VX Heavens Prosecution

www.pcworld.com
For more than a decade, "Herm1t" -- the online nickname of Andrey Baranovich -- has chronicled the development of malicious code on a website called VX Heavens....
Security Experts Push Ukraine to Drop VX Heavens Prosecution

10 Questions for StillSecure CFO Larry Middle

www.pcworld.com
StillSecure brings together security experts, certified processes, and technologies to take a holistic approach to its products and services....
10 Questions for StillSecure CFO Larry Middle

Google Wants To Operate .Search As A "Dotless" Domain, Plans To Open .Cloud, .Blog And .App To Others

techcrunch.com
If it gets it, Google wants to turn .search into a “dotless domain,” the company told ICANN a few days ago. Last year, Google applied to manage the .app, .blog, .cloud and .search generic top-level domain (gTLD) names as part of a major expansion of the domain-name system. ICANN, which...
Google Wants To Operate .Search As A "Dotless" Domain, Plans To Open .Cloud, .Blog And .App To Others

AP Twitter hack looks like a security tipping point

www.computerworld.com
Getting hacked on Twitter is fast becoming a rite of passage for big corporations, but Tuesday's attack on the Associated Press could be a tipping point and shows that social networks must do more to keep their users safe, security experts said....
AP Twitter hack looks like a security tipping point

FAQ: What you need to know about Friday’s CISPA vote

paidcontent.org
The U.S. House of Representatives votes Friday on a major cyber-security bill that changes how companies like Facebook can share personal information. Privacy advocates are in uproar and the Obama Administration is threatening a veto. What’s going on? Here’s a plain English guide to the polices and politics driving the Cyber...
FAQ: What you need to know about Friday’s CISPA vote

Security startup Nok Nok Labs wants to rid the world of passwords

gigaom.com
Startup Nok Nok Labs has developed a security protocol that asks end users to substitute stronger authentication tools such as fingerprints and voice recognition for the usual user names and passwords. Named after the classic knock-knock joke, Nok Nok Labs wants to revolutionize online identity authentication with tools that already...
Security startup Nok Nok Labs wants to rid the world of passwords
× Just a test of the new info bar. What do you think?