Security News

World’s first (known) bootkit for OS X	 can permanently backdoor Macs
2015-01-08 08:59

http://arstechnica.com/security/2015/01/worlds-first-known-bootkit-for-os-x-can-permanently-backdoor-macs/ By Dan Goodin Ars Technica Jan 7, 2015

Highly advanced backdoor trojan cased high-profile targets for years
2014-11-24 10:29

http://arstechnica.com/security/2014/11/highly-advanced-backdoor-trojan-cased-high-profile-targets-for-years/ By Dan Goodin Ars Technica Nov 23 2014

How a Crypto 'Backdoor' Pitted the Tech World Against the NSA
2013-09-25 06:33

http://www.wired.com/threatlevel/2013/09/nsa-backdoor/ By Kim Zetter Threat Level Wired.com 09.24.13

NSA’s Decade-Long Plan to Undermine Encryp	tion Includes Backdoors, Stolen Keys, Manipulat	ing Standards
2013-09-06 07:41

http://www.wired.com/threatlevel/2013/09/nsa-backdoored-and-stole-keys/ By Kim Zetter Threat Level Wired.com 09.05.13

At Facebook, zero-day exploits, backdoor code bring war games drill to life
2013-02-11 08:28

http://arstechnica.com/security/2013/02/at-facebook-zero-day-exploits-backdoor-code-bring-war-games-drill-to-life/ By Dan Goodin Ars Technica Feb 10 2013

Intruders hack industrial heating system using backdoor	posted online
2012-12-14 09:48

http://arstechnica.com/security/2012/12/intruders-hack-industrial-control-system-using-backdoor-exploit/ By Dan Goodin Ars Technica Dec 13 2012

Equipment Maker Caught Installing Backdoor Vows to Fix Following Public Pressure
2012-05-01 05:09

http://www.wired.com/threatlevel/2012/04/ruggedcom-to-fix-vuln/ By Kim Zetter Threat Level Wired.com April 30, 2012

Equipment Maker Caught Installing Backdoor Account in Control System Code
2012-04-26 06:44

http://www.wired.com/threatlevel/2012/04/ruggedcom-backdoor/ By Kim Zetter Threat Level Wired.com April 25, 2012

Hacked memo leaked: Apple, Nokia, RIM supply backdoors for gov't intercept?
2012-01-09 07:54

http://blogs.computerworld.com/19531/hacked_memo_leaked_apple_nokia_rim_supply_backdoors_for_govt_intercept By Darlene Storm Security Is Sexy Computerworld.com January 8, 2012