Top

Tag: Risk Assessment


Cybersecurity

Ashley Madison password crack could spell trouble across the Internet

September 10, 2015

Via: Dan Goodin

Now that a hobbyist team has uncovered programming errors that make more than 15 million of the Ashley Madison account passwords orders of magnitude faster to crack, it will be only a matter of time before a large percentage of […]


Cybersecurity

What us worry? Ashley Madison says it added over 100K users last week

August 31, 2015

Via: Dan Goodin

Executives at Ashley Madison may have lost their founder and CEO after suffering a breach that leaked highly personal details for more than 30 million users, but they want to make one thing clear: business fundamentals are strong, and the […]


Cybersecurity

White House eyes sanctions for China over cyber-theft of trade secrets

August 31, 2015

Via: Sean Gallagher

The Washington Post’s Ellen Nakashima reports that under the direction of the Obama administration, US government officials are planning “a package of unprecedented economic sanctions against Chinese companies and individuals” who have profited from trade secrets stolen from US companies […]


Cybersecurity

NSA preps quantum-resistant algorithms to head off crypto-apocalypse

August 21, 2015

Via: Dan Goodin

The National Security Agency is advising US agencies and businesses to prepare for a time in the not-too-distant future when the cryptography protecting virtually all e-mail, medical and financial records, and online transactions is rendered obsolete by quantum computing. Quantum […]


Cybersecurity

Advanced spyware for Android now available to script kiddies everywhere

July 23, 2015

Via: Dan Goodin

One of the more recent discoveries resulting from the breach two weeks ago of malware-as-a-service provider Hacking Team is sure to interest Android enthusiasts. To wit, it’s the source code to a fully featured malware suite that had the ability […]


Cybersecurity

Hacking Team goes to war against former employees, suspects some helped hackers

July 20, 2015

Via: Cyrus Farivar

Italian prosecutors have begun a criminal investigation of six former employees of the embattled company Hacking Team, according to a Reuters’ report citing anonymous sources. Hacking Team was hacked two weeks ago and had its data published all over the […]


Cybersecurity

ProxyHam’s early demise gives way to new and improved privacy devices

July 15, 2015

Via: Dan Goodin

Privacy advocates disappointed about the sudden and unexplained demise of the ProxyHam device for connecting to the Internet have reason to cheer up: there are two similarly low-cost boxes that do the same thing or even better. The more impressive […]


Cybersecurity

Report: Hack of government employee records discovered by product demo

June 12, 2015

Via: Sean Gallagher

As officials of the Obama administration announced that millions of sensitive records associated with current and past federal employees and contractors had been exposed by a long-running infiltration of the networks and systems of the Office of Personnel Management on […]


Uncategorized

Flawed Android factory reset leaves crypto and login keys ripe for picking

May 21, 2015

Via: Dan Goodin

An estimated 500 million Android phones don’t completely wipe data when their factory reset option is run, a weakness that may allow the recovery of login credentials, text messages, e-mails, and contacts, computer scientists said Thursday. In the first comprehensive […]


Uncategorized

‘90s-style security flaw puts millions of routers at risk

May 21, 2015

Via: Peter Bright

As companies continue to beat the Internet of Things drum, promoting a world when every device is smart, and anything electronic is network connected, we have some news that shows just what a horrible idea this really is. A security […]


Uncategorized

HTTPS-crippling attack threatens tens of thousands of Web and mail servers

May 20, 2015

Via: Dan Goodin

Tens of thousands of HTTPS-protected websites, mail servers, and other widely used Internet services are vulnerable to a new attack that lets eavesdroppers read and modify data passing through encrypted connections, a team of computer scientists has found. The vulnerability […]


Uncategorized

Use privacy software if you want to be safe from Facebook, warns watchdog

May 17, 2015

Via: WIRED UK

A Belgian watchdog has urged all Internet users to download privacy software specifically to shield themselves from Facebook’s grasp. The social network has been under fire for the ways in which it tracks user and non-user behaviour online, without consent, […]


Uncategorized

Lawyers threaten researcher over key-cloning bug in high-security lock

May 5, 2015

Via: Dan Goodin

Critical vulnerabilities in a market-leading line of digital locks securing hospitals, airports, and water treatment facilities makes it possible for rogue employees or outside attackers to clone digital keys, researchers reported late last week. Thursday’s advisory from security firm IOActive […]


Uncategorized

Super secretive malware wipes hard drive to prevent analysis

May 4, 2015

Via: Dan Goodin

Researchers have uncovered new malware that takes extraordinary measures to evade detection and analysis, including deleting all hard drive data and rendering a computer inoperable. Rombertik, as the malware has been dubbed by researchers from Cisco Systems’ Talos Group, is […]


Uncategorized

Google’s new version of Password Alert blocking bypass is bypassed

May 1, 2015

Via: Dan Goodin

On Thursday, Ars reported that a new service that warns when Google account users’ passwords are phished had been bypassed by a drop-dead simple exploit, just 24 hours after Google had rolled out the Chrome plugin. Within hours of publication, […]


Uncategorized

Report: Unclassified e-mails from Obama to staff read by Russian hackers

April 26, 2015

Via: Megan Geuss

On Saturday the New York Times reported that “senior American officials briefed on the investigation” confirmed a hack of the White House’s unclassified network last year. The breach “was far more intrusive and worrisome than has been publicly acknowledged,” officials […]


Uncategorized

1,500 iOS apps have HTTPS-crippling bug. Is one of them on your device?

April 20, 2015

Via: Dan Goodin

  About 1,500 iPhone and iPad apps contain an HTTPS-crippling vulnerability that makes it easy for attackers to intercept encrypted passwords, bank-account numbers, and other highly sensitive information, according to research released Monday. An estimated two million people have installed […]


Uncategorized

DEA, US Army bought $1.2M worth of hacking tools in recent years

April 16, 2015

Via: Cyrus Farivar

The Drug Enforcement Administration (DEA) and the United States Army have almost certainly been buying questionable remote access hacking tools for years from an Italian company called Hacking Team, via an obscure American reseller called Cicom USA. Hacking Team openly […]


Uncategorized

Meet the e-voting machine so easy to hack, it will take your breath away

April 15, 2015

Via: Dan Goodin

Virginia election officials have decertified an electronic voting system after determining that it was possible for even unskilled people to surreptitiously hack into it and tamper with vote counts. The AVS WINVote, made by Advanced Voting Solutions, passed necessary voting […]


Uncategorized

Elite cyber crime group strikes back after attack by rival APT gang

April 15, 2015

Via: Dan Goodin

One day a last year, an obscure cyber espionage group sent a spear phishing e-mail. It carried the usual trappings of a spear phish sent by advanced persistent threat actors. It was short, appeared to come from an address the […]