security holes

security holes

DMCA As Censorship: Chilling Effects On Research

www.techdirt.com
Professor Ed Felten, back from his brief foray as the FTC's chief technology officer, has written a fantastic piece for Slate detailing how the DMCA is creating massive chilling effects for researchers. This should come as little surprise, seeing as Felten himself was famously threatened by the recording industry for...
DMCA As Censorship: Chilling Effects On Research

Hackers Find IP Addresses Of All Skype Users

www.fastcompany.com
News updates all day from your Fast Company editors.A script was found on GitHub this past weekend that uses security holes in Skype to display a user's remote and local IP addresses.The script exploits a security hole in Skype 5.5 to fish out all IP information related to an individual...
Hackers Find IP Addresses Of All Skype Users

Aaron Swartz's Last Project: Open Source System To Securely & Anonymously Submit Documents To The Press

www.techdirt.com
The New Yorker has announced a new anonymous document sharing system called Strongbox, that will allow people to anonymously and securely submit documents to reporters from the New Yorker. Other publications have tried to set up something like this -- often inspired by Wikileaks -- but for the most part,...
Aaron Swartz's Last Project: Open Source System To Securely & Anonymously Submit Documents To The Press

Apple ID accounts reportedly vulnerable to password reset hack, forgot password page taken offline for maintenance

www.engadget.com
Gaping security holes are a pretty terrifying thing, especially when they involve something as sensitive as your Apple ID. Sadly it seems that immediately after making the paranoid happy by instituting two-step authentication a pretty massive flaw in Cupertino's system was discovered and first reported by The Verge. Turns...
Apple ID accounts reportedly vulnerable to password reset hack, forgot password page taken offline for maintenance

Android, iPhone 4S Hacked at Security Conference

betabeat.com
Get off the phone, CEO guy. (flickr.com/perspective) Attendees at the EuSecWest-sponsored World Security Professional Summit in Amsterdam are participating in a contest called Mobile Pwn2Own. Contestants are, yes, basically revealing that our mobile devices can be easily pwned by someone with the know-how. Quell your bubbling phone fanboy or fangirl...
Android, iPhone 4S Hacked at Security Conference
Solving IT headaches with a monitoring dashboard in the cloud

Google is giving away a million bucks to those who can successfully hack Chrome

thenextweb.com
Making sure that you have the most secure browser on the web means that you need a whole lot of people doing continual security audits and QA. While Google surely has this experience and capability in-house, the company like to challenge outsiders to find holes in its Chrome browser, and...
Google is giving away a million bucks to those who can successfully hack Chrome

Despite its efforts to fix vulnerabilities, Yahoo's Mail users continue reporting hacking incidents

thenextweb.com
Yahoo Mail users have been seeing their accounts broken into for months. While Yahoo says it has plugged at least two separate security holes leading to accounts getting hijacked, it appears the problem persists. While it’s unclear how long these attacks have been going on for, we first reported Yahoo...
Despite its efforts to fix vulnerabilities, Yahoo's Mail users continue reporting hacking incidents
Virgin Mobile is indifferent to its gaping security holes, says developer

Facebook for Android Bug Holds Lessons for Developers, Users

www.readwriteweb.com
App updates may not seem like a big deal. Sure, they fix bugs and provide fun stuff like new features and enhanced user interfaces. But they can also patch potentially serious security holes. Case in point: a recent Facebook vulnerability found in the company's Android software developer kit (SDK). A...
Facebook for Android Bug Holds Lessons for Developers, Users
Forget Apple: Oracle to bring Java security fixes directly to Mac users

Do you need to uninstall Java to be safe from its vulnerabilities?

reviews.cnet.com
With the latest security holes coming to light, many are recommending removing Java entirely from your system. If you don't want to go that far, here are some things you can do. [Read more]...
Do you need to uninstall Java to be safe from its vulnerabilities?

'Mitt Romney Almost President' Malware Attack Fakes CNN News Alert

betabeat.com
Detail of image from SophosLabs SophosLabs reports that malware attacks tend to surge near major elections and the most recent is calculated to pull in anxious voters on either side of the political spectrum–a malicious email purporting to come from CNN declaring “CNN Breaking News – Mitt Romney Almost President.”...
'Mitt Romney Almost President' Malware Attack Fakes CNN News Alert

In less than 24 hours, Google patches Chrome to plug security hole found at its Pwnium 2 event

thenextweb.com
Last night, Google held its Pwnium 2 competition, offering up a total of $2 million for security holes found in Chrome. Only one was discovered; a young hacker who goes by the alias “Pinkie Pie” netted the highest reward level: a $60,000 cash prize. Google today patched the flaw and...
In less than 24 hours, Google patches Chrome to plug security hole found at its Pwnium 2 event

PayPal offers bug bounty to uncover security holes

gigaom.com
PayPal was one of the first companies to offer a bug reporting program, giving security researchers a way to report flaws with its payment service. But like Google, Facebook and Mozilla, PayPal is now upping the ante with a paid bug bounty program, which will reward researchers for finding holes...
PayPal offers bug bounty to uncover security holes

Faster, better, stronger: Get your PC in tip-top shape

www.pcworld.com
Trying to keep your PC running smoothly sometimes feels like an impossible task. Windows is prone to all kinds of bloat, which can bog down your PC or--in severe cases--even render a system functionally useless. Over time, it's almost impossible to prevent unsavory apps and other files from infiltrating...
Faster, better, stronger: Get your PC in tip-top shape

Google Apps Users Can Now Get 24×7 Phone Support For Chrome

techcrunch.com
Google just announced that Google Apps for Business, Education and Government customers can now call and email the company with their questions about Chrome. Google, of course, has always been somewhat notorious for its lack of customer support options, but this is slowly changing. Last November, for example, the company announced...
Google Apps Users Can Now Get 24×7 Phone Support For Chrome

Adobe issues emergency update for Flash

news.cnet.com
Two previously unknown security holes prompt the company to issue an emergency update across all platforms. [Read more]...
Adobe issues emergency update for Flash
Windows 8 SmartScreen leaves user data exposed, says researcher
Dutch government introduces disclosure guidelines for white hat hackers

Legendary white-hat hacker Kristin Paget hired by Apple

www.electronista.com
Microsoft employee and white-hat hacker Kristin Paget is now reportedly working at Apple, as an operating system security researcher. As of September, her LinkedIn profile declares her as a "Core OS Security Researcher at Apple." In Microsoft's employ, Paget worked with a team to find security holes in the operating...
Legendary white-hat hacker Kristin Paget hired by Apple

How Hackers Can Be Good For Business

www.fastcompany.com
For hackers who are just trying to help, the Dutch government has a new system to report holes. Noting that responsible hacking is "a good contribution" to increasing security in software and other technology, the Dutch Ministry of Security and Justice set forth guidelines for hackers who spot security...
How Hackers Can Be Good For Business

Last week on GigaOM Research: all cloud, all the time

gigaom.com
While a series of acronyms dominated the news this week – WWDC, PRISM, E3 – over on GigaOM Research, our analysts were laser-focused on the cloud. This week, we’re featuring three in-depth research reports that look at the cloud in three distinct ways. No surprise there, as Structure, our signature...
Last week on GigaOM Research: all cloud, all the time

The Hackers Who Found The First Windows 8 Bug Have Put It Up For Sale (MSFT)

www.businessinsider.com
That didn't take long. Windows 8 was officially released a week ago and hackers have already found a security flaw in it. But that's not even the worst news. These guys have not told Microsoft about the flaw. Instead, they're selling it to others, reports Computerworld. The flaw was found...
The Hackers Who Found The First Windows 8 Bug Have Put It Up For Sale (MSFT)

With Google out of the picture, WebKit's open-source developers plan removal of Chromium code and references

thenextweb.com
With Google’s announcement yesterday to fork WebKit and build a new rendering engine called Blink, the WebKit team has announced plans to streamline the project. Since the rendering engine no longer needs to support the Chromium port, there’s a huge slew of code that can be removed. Here’s the high-level...
With Google out of the picture, WebKit's open-source developers plan removal of Chromium code and references

Google Details Chrome Browser Security-testing Technology

www.pcworld.com
Since late last year, Google has been using an industrial-strength testing system to identify, analyze and fix security holes in its Chrome browser, helping it......
Google Details Chrome Browser Security-testing Technology

Charlie Miller to reveal 20 zero day security holes in Mac OS X

www.engadget.com
Charlie Miller to reveal 20 zero day security holes in Mac OS X
Oracle updates Java to fix security exploits already in the wild, but safety is not guaranteed

Google releases Chrome for Android on Intel devices, slowly rendering the stock browser obsolete

thenextweb.com
Google today announced the release of Chrome for Android on Intel x86 devices. You can download Chrome 18.0.1026311 from the official Google Play store. In addition to the usual security and stability improvements, here’s the release log of Chrome for Android M18.1: Location preference now integrated to system level Google...
Google releases Chrome for Android on Intel devices, slowly rendering the stock browser obsolete

In pursuit of root

diveintomark.org
Tim Bray asks how to root the Nexus One. The process is a bit complicated, but (unlike most other Android phones) it does not rely on exploiting security holes. Android and Me has a great tutorial, so I won’t repeat them here. The key is in step 1, the fastboot...
In pursuit of root
× Just a test of the new info bar. What do you think?