Portable LibreSSL appears as project inches towards prime time
Another step towards LibreSSL’s goal of replacing OpenSSL as the go-to library for transport layer security has occured, with an official portable version of the library now available for testing on...
View ArticleCyber Warfare Specialist/Intermediate Reverse Engineer
Thank you for your interest in the Cyber Warfare Specialist/Intermediate Reverse Engineer. Incoming search terms for the article: inposttitle:warfare
View ArticleApple refutes China report on iPhone threat to national security
iPhone maker dismisses suggestions that the “frequent locations” function on the smartphone can monitor the location of the user’s movements, noting that personal data is encrypted and stored locally...
View ArticleHere’s the only safe way to use public PCs
As the Secret Service says, business center PCs can be dangerous. The only safe way to use such devices is not to use the installed OS.
View ArticleMayor lashes out over memorial for cop-killer
A man whose wife was killed by lightning says he doesn’t remember hearing or feeling anything when the bolt struck while they were hiking in Rocky Mountain National Park – only waking up to see a...
View ArticleGoogle Chrome to Change Malware Warnings
The messages in Googles web browser warning users of the dangers of accessing a page presenting a security risk are to be changed as the company experiments with new ones. Google security engineer...
View ArticleLinkedIn Credentials Targeted By Phishing Campaign
Even if Facebook is the preferred social network targeted by scammers, similar services from other companies are not overlooked. A recent campaign seeks to steal the credentials of LinkedIn...
View ArticleAlmost 70 Percent of Critical Infrastructure Companies Breached in Last 12...
New research from Unisys and the Ponemon Institute underscores that many critical infrastructure companies remain challenged when it comes to security.
View ArticleHow to Reduce Use-After-Free Memory Risk
Use-after-free memory errors often crop up in software application code.
View ArticleCNET attacked by Russian hacker group
A Russian hacker group that has attacked some of the biggest news and business sites in the world claims it penetrated CNET’s website over the weekend and stole a database of registered reader data.
View ArticleSecret App Raises $25 Million, Shifts Focus
WASHINGTON – The fast-growing anonymous mobile app Secret said Monday it had raised $25 million in venture capital and would expand as a social network connecting Facebook friends.
View ArticleOverarching technology strategy needed: Murray financial inquiry
A total of 28 observations were made by the Murray Inquiry into the Australian financial sector, including how the existing system needs a single strategy in place to look at various technology-related...
View ArticleReported hacking into federal employee database highlights new cybersecurity...
According to a July 9 report by the New York Times, hackers breached the Office of Personnel Management’s computer systems in March.
View ArticleActive Directory Vulnerability Puts Enterprise Services at Risk
A vulnerability in Microsoft’s Active Directory service can be exploited by an attacker to change a targeted user’s password, Active Directory protection solutions provider Aorato reported.
View ArticleSecurity Vulnerability Found in Popular WPtouch WordPress Plugin
A recently discovered vulnerability in WPtouch, a popular plugin that’s used to create simple themes for the mobile visitors of WordPress websites, can be leveraged by an attacker to upload PHP files...
View Article1 in 6 Say Their Organization Had At Least 5 Significant Security Incidents...
A new report from ForeScout Technologies described a challenging world for IT security – one where one in six IT pros say their organization has had five or more significant security incidents in the...
View ArticleUS Secret Service warns that hotel PCs are targeted by hackers
THE UNITED STATES Secret Service has told the hospitality industry to check their business centre PCs for keystroke logging malware.
View ArticleOracle fixes many vulnerabilities in dozens of products
Today’s quarterly update affects over 100 versions of 44 products including the Oracle database, Java and PeopleSoft Enterprise.
View ArticleActive Directory Flaw Could Lead to Unauthorized Password Change
A proof-of-concept (PoC) attack has been crafted by a cybersecurity firm for a design flaw in the Active Directory service, which would allow an attacker to modify the victims password even if some...
View ArticleMinimizing the risk of identity theft
Identity theft is a very real and present danger. In the past 12 months some seven million Canadians became victims of identity theft with an average direct cost per victim of US$372.00, according to...
View Article