security researchers

security researchers

Netherlands offers guidelines to work with hactivists

www.pcworld.com
The Dutch government's cyber security center has published guidelines that it hopes will encourage ethical hackers to disclose security vulnerabilities in a responsible way. "Persons who report an IT vulnerability have an important social responsibility," the Dutch ministry of Security and Justice said on Thursday, announcing guidelines for ethical...
Netherlands offers guidelines to work with hactivists

Bug Bounty Hunters Reveal Eight Vulnerabilities in Google Services

www.pcworld.com
Security researchers unveiled eight vulnerabilities in Google services during the Hack in the Box conference in Amsterdam on Thursday -- but they claim to have......
Bug Bounty Hunters Reveal Eight Vulnerabilities in Google Services

Google slates Pwnium 3 contest for March 7, offers up to $3.14159m for vulnerabilities in Chrome OS

thenextweb.com
Google on Monday announced it is hosting its third Pwnium competition, aptly named Pwnium 3, on March 7. The security contest’s main focus will be Chrome OS, for which the company will be offering up to a total of $3.14159 million in rewards for security researchers (Google loves using geeky...
Google slates Pwnium 3 contest for March 7, offers up to $3.14159m for vulnerabilities in Chrome OS

Phone sensors spot security secrets

www.bbc.co.uk
The information captured by smartphone sensors could help criminals guess codes used to lock the gadgets, say security researchers....
Phone sensors spot security secrets

Botnet masters hide command-and-control server inside the Tor network

www.pcworld.com
Security researchers from German antivirus vendor G Data Software have identified a botnet that is controlled by attackers from an Internet Relay Chat (IRC)......
Botnet masters hide command-and-control server inside the Tor network

Google Wallet vulnerability expands to stock Android phones

www.electronista.com
Yet another Google Wallet vulnerability has been spotted, just one day after security researchers published details of a similar issue that only affects rooted devices. The latest vulnerability is claimed to affect all Android devices, however, including those running stock software.......
Google Wallet vulnerability expands to stock Android phones

Skype And Dropbox Fix Redirect Security Hole That Could've Hacked Your Facebook

techcrunch.com
Nir Goldschlager just saved your identity. One of the world’s top white hat security researchers, Goldschlager this week helped Skype and Dropbox fix a critical security flaw that could have let hackers take control of their users’ Facebook accounts. Tomorrow Goldschlager will detail how found the exploit, but he gave...
Skype And Dropbox Fix Redirect Security Hole That Could've Hacked Your Facebook

Spammers Have Started Using Android Botnets, Researchers Say

www.pcworld.com
A new wave of pharmacy, penny stock and e-card spam emails are being sent by an Android botnet, according to security researchers from Microsoft and antivirus......
Spammers Have Started Using Android Botnets, Researchers Say

Apple may replace UDID with new, privacy-conscious tracking system

arstechnica.com
Apple is planning to give developers a new way to keep track of users, replacing the now-deprecated Unique Device Identifier (UDID), according to sources speaking to the Wall Street Journal. The sources don't appear to have explicitly named WWDC as the venue for the announcement, but the tool is supposed...
Apple may replace UDID with new, privacy-conscious tracking system

Security Researchers to Present New 'CRIME' Attack Against SSL/TLS

www.pcworld.com
Two security researchers claim to have developed a new attack that can decrypt session cookies from HTTPS (Hypertext Transfer Protocol Secure) connections....
Security Researchers to Present New 'CRIME' Attack Against SSL/TLS

New "Chameleon" Botnet Could Be Costing Advertisers Up To $6 Million A Month

techcrunch.com
Botnets. To security researchers, they’re like digital Hydra. For each vicious head they lop off, another two explode from the stump. Just a month ago, Microsoft and Symantec announced that they’d manage to take down the massive Bamital botnet, which is said to have been fakin’ clicks to the tune...
New "Chameleon" Botnet Could Be Costing Advertisers Up To $6 Million A Month

Android apps 'leak' personal data

www.bbc.co.uk
Millions of people are using Android apps that leak key personal information, warn German security researchers....
Android apps 'leak' personal data

U.S. Federal Law Enforcement Says It's Impossible to Wiretap iMessage Conversations

www.macrumors.com
CNET has obtained a 'sensitive' U.S. Drug Enforcement Agency document that says it is impossible for law enforcement agencies to eavesdrop on iMessage conversations, even with a court order, because of Apple's "secure end-to-end encryption". The memo appears to be aimed at informing DEA agents that while they may have...
U.S. Federal Law Enforcement Says It's Impossible to Wiretap iMessage Conversations

LinkedIn's app transmits user data without their knowledge

news.cnet.com
iOS app collects users' calendar data and transmits it to the networking company's servers, without revealing the transmission to members, two mobile security researchers discover. [Read more]...
LinkedIn's app transmits user data without their knowledge

HTC supplies fix for 'small' Android Wi-Fi password leak

www.theverge.com
HTC is addressing an issue on some of its Android devices that exposes Wi-Fi security credentials to applications. Security researchers Chris Hessing and Bret Jordan discovered that third-party Android applications on a range of HTC handsets with the android.permission.ACCESS_WIFI_STATE permission could call a command to access the Wi-Fi credentials...
HTC supplies fix for 'small' Android Wi-Fi password leak

Hackers can easily breach Emergency Alert Systems

news.cnet.com
Security researchers warn that many emergency alert system devices used by radio and TV stations are susceptible to cyberattacks, which could cause widespread panic. [Read more]...
Hackers can easily breach Emergency Alert Systems
Google pays out $11,500 in bug bounty for Chrome 20
New zero-day exploits in industrial software channel the ghost of Microsoft Bob

Drive-by-download Attack Exploits Critical Vulnerability in Windows Media Player

www.pcworld.com
Security researchers from antivirus vendor Trend Micro have come across a Web-based attack that exploits a known vulnerability in Windows Media Player....
Drive-by-download Attack Exploits Critical Vulnerability in Windows Media Player

Iran accused of using online censorship and hacking to sway presidential poll

www.guardian.co.uk
Keyword-based filtering allows blocking of sites and texts containing candidates' names and slogans, say security expertsIranian authorities are mounting a sophisticated campaign of online censorship, hacking attacks and filtering to influence the country's imminent presidential elections, according to reports from people inside the country and security researchers outside.Iranians are finding...
Iran accused of using online censorship and hacking to sway presidential poll

Kaspersky Lab Sniffs Out New Flame-like Malware Aimed at Lebanon's Banks

betabeat.com
Mr. Kaspersky not looking supervillain-like at all. (Photo: flickr.com/cebitaus Eugene Kaspersky’s security researchers at Kaspersky Lab have sleuthed out a new “cyber-espionage weapon.” The Russian supervillain’s (or awesomely cool billionaire, depending on your point of view) labs say this weapon has nearly as cool a name as previously discovered cyber...
Kaspersky Lab Sniffs Out New Flame-like Malware Aimed at Lebanon's Banks

Stabuniq malware found on servers at U.S. financial institutions

www.computerworld.com
Security researchers from Symantec have identified an information-stealing Trojan program that was used to infect computer servers belonging to various U.S. financial institutions....
Stabuniq malware found on servers at U.S. financial institutions

Google left heating, cooling system open to hackers

www.pcworld.com
Hackers could have turned up the heat in one of Google's offices in Sydney. Literally.Computer security researchers with Cylance found that Google's Australia branch was using an unpatched version of Niagara, a software system used for managing control systems in buildings.Billy Rios, technical director and director of consulting for...
Google left heating, cooling system open to hackers

Free Ride

allthingsd.com
Those NFC phones are kind of really easy to use. So it just lowers the bar for people who want to commit fraud to a very, very low level. –Postdoctoral researcher Collin Mulliner, on the hack used by two mobile security researchers to get free rides out of the SF...
Free Ride

Boot up: LCD TV shipments fall, is Android@Home?, Apple's new patent, Google's map u-turn and more

www.guardian.co.uk
Plus Microsoft v the FSF's donate page, new RIM rumours, demonstrating patentable software and moreA quick burst of 10 links for you to chew over, as picked by the Technology teamLCD TV shipments decline for first time ever >> CNNGot an LCD TV? Apparently, so does the rest of the...
Boot up: LCD TV shipments fall, is Android@Home?, Apple's new patent, Google's map u-turn and more
ZeroAccess: A look at just how big a botnet can get

Researchers Find Critical Vulnerability in Java 7 Patch Hours After Release

www.pcworld.com
Security researchers from Poland-based security firm Security Explorations claim to have discovered a vulnerability in the Java 7 security update released......
Researchers Find Critical Vulnerability in Java 7 Patch Hours After Release

Hands-on with five antivirus apps for the Mac

arstechnica.com
So Mac invulnerability to malware is a myth, at least according to security researchers from Kaspersky Lab. And although such a blunt statement may be a blow to the ego of some Mac users, it remains true. Security researchers from all walks have long argued that it was only a...
Hands-on with five antivirus apps for the Mac

Hacker on hacker: Zeus bot master dupes Anonymous backers into installing password stealer

www.computerworld.com
Hackers have duped supporters of the Anonymous group into installing the Zeus botnet, which steals confidential information from PCs, including banking usernames and passwords, security researchers said last week....
Hacker on hacker: Zeus bot master dupes Anonymous backers into installing password stealer

Researchers bypass Android encryption by exposing phones to freezing temperatures

appleinsider.com
Security researchers in Germany have discovered that physically freezing an Android smartphone can grant access to encrypted data....
Researchers bypass Android encryption by exposing phones to freezing temperatures
× Just a test of the new info bar. What do you think?