BMC Vulnerability Exposes Admin Passwords in Plain Text
Plain text passwords for remote log in to servers can be accessed from machines equipped with motherboards built by Supermicro, a company that manufactures and sells computer hardware. The security...
View ArticleNorfolk voyeur’s actions were “deeply disturbing”
A Norfolk man has been jailed for filming unwitting women in shop and swimming pool changing rooms in Norwich and Wymondham.
View ArticleOpenSSL Vulnerability Addressed in Android 4.4.4 Update
The latest security flaw in OpenSSL has been addressed on Android with the fresh release of the 4.4.4 KitKat (KTU84P) update, which will roll out to Nexus devices. There isnt too much information about...
View Article“Yo” Messaging App Gets Hacked Multiple Times
Messaging app Yo has been under a lot of stress lately, as it has been the object of various curious users that tried to make it do something else than just send a Yo message to a contact. The app,...
View ArticleBank Not Responsible for Money Lost in Cyberheist, Court of Appeals Decides
The Court of Appeals for the Eight Circuit has denied an escrow firm, Choice Escrow, recovery of $440,000/323,000 EUR from the bank BancorpSouth, which approved a fraudulent wire transfer request. Back...
View ArticleYo app hacked: Users spammed, Rickrolled
Yo, the greatest monosyllabic thing to happen to apps, is reportedly riddled with security holes.
View ArticleBromium CTO Explains Promise of Secure by Design
Simon Crosby, co-founder and CTO of Bromium, details his company’s progress to deliver a fault tolerant security solution.
View ArticleCompany Settles with Bank in Wire Fraud Lawsuit
An oil company settled with its bank for $350,000 (257,000) after suing it for failing to provide commercially reasonable security measures for protecting the funds.Back in 2011, TRC Operating Co....
View ArticleCode Hosting Service Shuts Down After Cyber Attack
Code Spaces shuttered its doors after a hacker accessed the company’s Amazon EC2 control panel and erased business data and other information.
View ArticleFlorida college applies corporate-style security to ‘BYOD’ campus network
Can a college campus filled with exuberant students and free-thinking professors armed to the hilt with smartphones and tablets find a way to establish business-like network security and...
View ArticleBoringSSL, an OpenSSL Fork for Google Products
Google started working on their own version of cryptographic library, dubbed BoringSSL, that relies on OpenSSL code but seeks to be more appropriate for their products. In order to adapt the...
View ArticleCompuVision Shares Tips for Minimizing Computer, Network Security…
This story is contributed by a member of the Ventura community and is neither endorsed nor affiliated with Ventura County Star Recent announcements of massive data breaches impacting personal or credit...
View ArticleHackers Access Metropolitan Companies Employee Information
As a result of a security breach, personal details of employees of several companies under the umbrella of The Metropolitan Companies, Inc., as well as of individuals that have submitted an application...
View ArticleCryptoLocker Variant Found with Weak Encryption
A modification of the infamous CryptoLocker ransomware Trojan that does not rely on the 2048-bit RSA encryption and does not communicate with a command and control server has been found in the wild....
View ArticleFake Box and Drive Email Directs to Spam Page
Some users have received emails claiming that image files uploaded to the Box cloud service have been damaged, luring to click on a link that lands them on a spam webpage.The message can be quite...
View ArticleFake Flash Player Update Prompted by Malicious Advertisement
Users of a video sharing website with more than 30 million members reported pop-up messages asking them to update Adobes Flash Player to the latest version.The video sharing service is provided by Nico...
View ArticleNetwork Security: Is It Time to Think Like a Thief?
At Cloud Expo, Intel’s Rishi Bhargava to provide an inside look at how technology is beating the bad guys at their own game What do a firewall and a fortress have in common? They are no longer strong...
View ArticleUS Lawmakers Pass Bill to Curb NSA
WASHINGTON, June 20, 2014 (AFP) – The US House of Representatives approved late Thursday a bill that would restrict the electronic surveillance powers of the National Security Agency (NSA). The margin...
View ArticleNorth Alabama police department computers hacked
TV reports that seven computers in the Collinsville Police Department have been affected by the hacking attack.
View ArticleCloud Encryption Best Practices for Financial Services
In many industries, cloud computing is now vital to remaining competitive. The cloud typically offers superior flexibility, scalability, accessibility, and high availability, enabling businesses to...
View Article