Security News > 2016 > November

Microsoft Silently Fixes Kernel Bug That Led to Chrome Sandbox Bypass (Threatpost)
2016-11-30 21:10

Microsoft appears to have silently fixed a two-year-old bug in in Windows Kernel Object Manager that could have allowed for the bypass of privileges in Google's Chrome browser.

Gooligan Android malware used to breach a million Google accounts (Help Net Security)
2016-11-30 19:58

Check Point security researchers have revealed a new variant of Android malware, breaching the security of more than one million Google accounts. The new malware campaign, named Gooligan, roots...

Organized sextortion led four British men to suicide​ (Help Net Security)
2016-11-30 19:32

Sextortion/webcam blackmail is a booming business for organised crime groups from the Philippines, Ivory Coast and Morocco, and young men across the UK are the most sought-after victims. What is...

Tor Patched Against Zero Day Under Attack (Threatpost)
2016-11-30 17:44

A zero-day vulnerability in Firefox, similar to one created by the FBI in 2013, is actively being exploited in the Tor Project’s anonymizing TorBrowser.

Firefox Scrambles to Patch Zero Day Actively Exploiting Tor Browser (Threatpost)
2016-11-30 17:44

A zero-day vulnerability in Firefox, similar to one created by the FBI in 2013, is actively being exploited in the Tor Project’s anonymizing TorBrowser.

Firefox 0-day exploited in the wild to unmask Tor users (Help Net Security)
2016-11-30 17:09

An anonymous user of the SIGAINT darknet email service has revealed the existence of a JavaScript exploit that is apparently being actively used to de-anonymize Tor Browser users. The warning came...

DigiTally (Schneier on Security)
2016-11-30 15:33

Ross Anderson describes DigiTally, a secure payments system for use in areas where there is little or no network connectivity....

Tips for businesses to avoid being the next big headline (Help Net Security)
2016-11-30 13:15

Data integrity breaches are set to send shockwaves throughout the world in 2017, with at least one almighty breach disclosure of this type expected next year, according to Jason Hart, CTO Data...

Seal the integrity of your logs with Waterfall BlackBox (Help Net Security)
2016-11-30 13:00

Upon discovery of a cyberattack, forensic experts look inside the compromised network’s various logs to locate and analyze tracks left by the attacker. Logs are the baseline information required...

SMEs more prone, but still quite oblivious, to cyberattacks (Help Net Security)
2016-11-30 12:45

Despite governments, organizations and brands intensifying their cybersecurity awareness campaigns in recent years, as well as several recent high-profile attacks and security breaches, it seems...