Security News

Vulnerability Identified in Genomic Data Sharing Network (Threatpost)
2015-11-02 21:08

A vulnerability in a network that processes genomic data could pave the way to some global genomic databases being hacked.

Latest EMET Bypass Targets WoW64 Windows Subsystem (Threatpost)
2015-11-02 20:29

Researchers have developed a bypass for Microsoft's EMET exploit mitigations by targeting a design limitation of the WoW64 subsystem that provides backwards compatibility for 32-bit applications...

Monthly Android Security Update Patches More Stagefright Vulnerabilities (Threatpost)
2015-11-02 20:10

Google released its monthly over-the-air Android security update to Nexus devices, patching another handful of vulnerabilities related to Stagefright.

Researchers can identify people through walls by using wireless signals (Help Net Security)
2015-11-02 15:21

Researchers at MIT's Computer Science and Artificial Intelligence Lab (CSAIL) have created a device that allows them to "see" what a person is doing and track his or her movement even if that person i...

Hacking Team pitches encryption-cracking tools to US law enforcement (Help Net Security)
2015-11-02 13:52

Hacking Team, the Italian company that provides offensive intrusion and surveillance software to governments, intelligence and law enforcement agencies, is back in the saddle, knocking on the doors of...

The Rise of Political Doxing (Schneier on Security)
2015-11-02 12:47

Last week, CIA director John O. Brennan became the latest victim of what's become a popular way to embarrass and harass people on the Internet. A hacker allegedly broke into his AOL account and...

Nearly 2,000 Vodafone UK customers' accounts compromised, blocked (Help Net Security)
2015-11-02 09:19

Customers of another UK telecom have had their information compromised by hackers, as Vodafone has explained that it was "subject to an attempt to access some customers’ account details between midnig...

Software-Defined Perimeter enables application-specific access control (Help Net Security)
2015-11-02 09:00

Back in the early 1990s enterprises migrated away from proprietary protocols such as DECnet, SNA, and Novell IPX to common standards such as IP. The motivation was the open nature of IP and access to ...

TalkTalk breach: Third arrest, data already for sale, criminals targeting pensioners (Help Net Security)
2015-11-02 08:21

News about the TalkTalk breach and the investigation of it are coming fast and thick. After the arrests of two teens (one in Northern Ireland, the other from Feltham) believed to be connected to t...

Most consumers believe cloud-based apps can be hacked (Help Net Security)
2015-11-02 08:00

Consumers often don’t realize that the applications they depend upon daily live in the cloud and therefore many may be unaware of the threat of breach to their personal data, according to Radware. Ove...