Security News

Evasion Techniques Keep Angler EK’s Cryptowall Business Thriving (Threatpost)
2015-07-02 17:03

The SANS Internet Storm Center reports that the Angler Exploit Kit, pushing Cryptowall 3.0 ransomware, uses rapidly changing URL patterns—almost daily changes—to evade detection and rake in profits.

Senator Demands Answers on FBI’s Use of Zero Days, Phishing (Threatpost)
2015-07-02 15:06

The chairman of the powerful Senate Judiciary Committee is asking some pointed questions of the FBI director about the bureau’s use of zero-day vulnerabilities, phishing attacks, spyware, and...

Amazon releases new, easily auditable TLS implementation (Help Net Security)
2015-07-02 13:52

A new, open source implementation of the TLS encryption protocol has been unveiled by Amazon Web Services. Dubbed s2n (shorthand for "signal to noise"), the library doesn't implement rarely used op...

Cisco UCDM Platform Ships With Default, Static Password (Threatpost)
2015-07-02 13:35

A week after admitting that several of its security appliances ship with static SSH keys, Cisco warned customers on Wednesday that its Unified Communications Domain Manager platform has a default,...

Harvard University suffers IT security breach (Help Net Security)
2015-07-02 12:40

Discovered on June 19, the intrusion was first spotted on the Faculty of Arts and Sciences and Central Administration information technology networks, but a subsequent investigation revealed that eigh...

Cloned, booby-trapped Dark Web sites steal bitcoins, login credentials (Help Net Security)
2015-07-02 11:54

Someone is cloning .onion sites, and using the clones to intercept user traffic and offer modified content. "I noticed a while ago that there is a clone onion site for Ahmia," Juha Nurmi, founder o...

How safe is the Windows 10 Wi-Fi sharing feature? (Help Net Security)
2015-07-02 09:27

A feature that went almost unnoticed in Windows Phone 8.1 because of its modest installation base has been raising security questions now that it has been added to Windows 10. It's called Wi-Fi Sen...

A closer look into the piracy ecosystem (Help Net Security)
2015-07-02 07:30

Illegal reproduction and distribution of copyrighted material on the Web is booming as a result of security breaches in both mobile and desktop software applications. Arxan and iThreat Cyber Grou...

Rise in DDoS reflection attacks using abandoned routing protocol (Help Net Security)
2015-07-02 07:21

There's been an increase in the use of outdated Routing Information Protocol version one (RIPv1) for reflection and amplification attacks, according to Akamai. RIPv1 is a fast, easy way to dynamica...