Security News

Trump Comments Straddle Line of Soliciting Computer Crime (Threatpost)
2016-07-27 20:03

Donald Trump may have left himself an out today when he urged Russian hackers to find 30,000 emails deleted by Hillary Clinton from her private server.

NIST Recommends SMS Two-Factor Authentication Deprecation (Threatpost)
2016-07-27 16:57

The U.S. National Institute for Standards and Technology (NIST) said SMS-based two factor authentication would soon be deprecated.

Attributing Advanced Attacks Remains Challenge For Researchers (Threatpost)
2016-07-27 16:27

Kaspersky Lab researchers participated in a Reddit AMA, touching on topics such as attack attribution, critical infrastructure security, attacker and researcher tradecraft, and the shortage of...

Yahoo Ordered to Explain Data Gathering Procedures in Deleted Email Case (Threatpost)
2016-07-26 21:26

Yahoo has been given until August 31 to comply with a court order asking how the company was able to recover emails that were thought to be deleted.

Kimpton Hotels Investigating Payment Card Fraud (Threatpost)
2016-07-26 18:50

Kimpton Hotels & Restaurants, a nationwide chain of 62 boutique hotels, is investigating a string of unauthorized charges on payment cards used at a number of its locations.

Public, Private Sector Team to Fight Ransomware (Threatpost)
2016-07-26 15:45

Security firms and law enforcement launch No More Ransom, a web-based effort dedicated to ransomware awareness and decryption tools.

KeySniffer Vulnerability Opens Wireless Keyboards to Snooping (Threatpost)
2016-07-26 13:30

Wireless keyboards made by eight different companies suffer from a vulnerability that can allow attackers to eavesdrop on keystrokes from up to 250 feet away, researchers warned Tuesday.

Unpatched Smart Lighting Flaws Pose IoT Risk to Businesses (Threatpost)
2016-07-26 13:05

Rapid7 has disclosed nine vulnerabilities in Orsam Lightify Pro and Home smart lighting products, some of which can be used as a pivot point for remote attacks.

Windows UAC Bypass Leaves Systems Open to Malicious DLLs (Threatpost)
2016-07-25 21:57

Launching a BypassUAC attack just got a bit easier with a new Windows User Account Control bypass technique that can fly under the radar of security solutions that monitor for this type of circumvention.

Upcoming Tor Design Battles Hidden Services Snooping (Threatpost)
2016-07-25 19:51

Researchers at Northeastern University next week at DEF CON are expected to present a paper describing their framework for discovering Tor hidden services directories that snoop on hidden services.