Bruce Schneier: Security Firms Are Not Financially Motivated to Stop Spam

Bruce Schneier: Security Firms Are Not Financially Motivated to Stop Spam

The expert believes that spam should be deleted in the middle of the network

Expert: USSD Codes Can Be Used to Remotely Reset Samsung Galaxy S3 Phones

Expert: USSD Codes Can Be Used to Remotely Reset Samsung Galaxy S3 Phones

Hackers can push the exploit via QR codes, websites, NFC, and WAP Push SMS

One Billion Users Affected by Java Security Sandbox Bypass Vulnerability, Experts Say

One Billion Users Affected by Java Security Sandbox Bypass Vulnerability, Experts Say

Security Explorations identifies an issue that affects Java SE 5, 6 and 7

Bruce Schneier on New Hash Algorithm (SHA-3): It’s Good, but We Don’t Need It

Bruce Schneier on New Hash Algorithm (SHA-3): It’s Good, but We Don’t Need It

The expert highlights the fact that current functions are still secure

Researchers Use NFC-Based Exploit to Ride the Subway for Free [Video]

Researchers Use NFC-Based Exploit to Ride the Subway for Free [Video]

This is possible because of a vulnerability in transit system access cards

Military, Energy and Oil Organizations Targeted in Mirage Campaign

Military, Energy and Oil Organizations Targeted in Mirage Campaign

The operation relies on spear phishing attacks aimed at company executives

Passwords of Oracle Database Users Exposed Because of Logon Protocol Bug

Passwords of Oracle Database Users Exposed Because of Logon Protocol Bug

Esteban Martinez Fayo of AppSec Inc developed a proof-of-concept tool for the flaw

Over 1 Million PCs Currently Part of ZeroAccess Global Botnet

Over 1 Million PCs Currently Part of ZeroAccess Global Botnet

The threat is helping cybercriminals earn as much as $100,000 (80,000 EUR) per day

Users of Mobile Portals Exposed to HTTP Header Pollution Attacks, Expert Finds

Users of Mobile Portals Exposed to HTTP Header Pollution Attacks, Expert Finds

The victim's phone number is enough for a cybercriminal to take over their account

  • Security
  • By Eduard Kovacs
  • September 19th, 2012
PlugX RAT Developer Connected to “Network Crack Program Hacker” Group

PlugX RAT Developer Connected to “Network Crack Program Hacker” Group

He might be one of the creators of the famous GuiWui rootkit

Internet Explorer Zero-Day Exploited in Wild, Tied to Poison Ivy and Nitro Attacks

Internet Explorer Zero-Day Exploited in Wild, Tied to Poison Ivy and Nitro Attacks

Microsoft is aware of the problem and is currently working on addressing it

Flame Has at Least Three More Brothers, Experts Found

Flame Has at Least Three More Brothers, Experts Found

Researchers have performed a thorough analysis of the threat's C&C servers

WhatsApp Accounts Can Be Easily Hacked, Experts Say

WhatsApp Accounts Can Be Easily Hacked, Experts Say

A number of issues expose the app’s customers to hack attacks

Researchers Find Botnet C&C Servers Hidden in Tor Anonymity Network

Researchers Find Botnet C&C Servers Hidden in Tor Anonymity Network

Suriya Prakash provides details of the threat and why it's so difficult to stop it

AlientVault Tracks Down Developer of PlugX RAT

AlientVault Tracks Down Developer of PlugX RAT

He describes himself as a virus expert and an individual proficient in assembly

Etsy Launches Security Bug Bounty Program

Etsy Launches Security Bug Bounty Program

The minimum reward is $500 (400 EUR) and an Etsy Security Team T-shirt

Expert: Stuxnet Did Not Escape into the Wild

Expert: Stuxnet Did Not Escape into the Wild

Professor Larry Constantine has an interesting theory regarding the infamous worm

 
Want more? Browse: