Security News

Vulnerabilities Identified in Dolphin, Mercury Android Browsers (Threatpost)
2015-08-24 19:33

Vulnerabilities exist in two fairly popular alternative browsers for Android – Dolphin and Mercury -- that depending on the browser could result in either remote code execution or arbitrary...

Court Rules FTC Has Authority to Punish Wyndham Over Breaches (Threatpost)
2015-08-24 18:20

In the latest installment of a long and winding court case related to multiple data beaches at Wyndham Worldwide several years ago, an appellate court has upheld the authority of the Federal Trade...

AlienSpy RAT Resurfaces as JSocket (Threatpost)
2015-08-24 17:37

The dismantled AlientSpy remote access Trojan, the same malware found on the phone of dead Argentine prosecutor Alberto Nisman, has resurfaced with new crypto and a new name.

White House Support for CISA Worries Privacy Advocates (Threatpost)
2015-08-24 15:10

While Congress is enjoying its annual summer recess, privacy advocates are worried that the White House’s recent endorsement of the controversial CISA bill–which has been criticized by DHS...

WordPress Compromises Behind Spike in Neutrino EK Traffic (Threatpost)
2015-08-21 15:04

A rash of compromised WordPress websites is behind this week’s surge in Neutrino Exploit Kit traffic

Apple Patches QuickTime Crash and Code Execution Flaws (Threatpost)
2015-08-21 13:34

Apple pushed out a new version of QuickTime that patched nine vulnerabilities, including a handful of denial of service and code execution bugs.

Facebook Updates Information-Sharing Platform (Threatpost)
2015-08-20 19:40

Facebook announced that its ThreatExchange information-sharing platform is closing in on 100 participants and has streamlined its application process.

Details Surface on Patched Sandbox Violation Vulnerability in iOS (Threatpost)
2015-08-20 17:32

Apple patched an issue last week in iOS that could have allowed attackers to bypass the third-party app-sandbox protection mechanism on devices and read arbitrary managed preferences via a special app.

Uptick in Neutrino Exploit Kit Traffic Doesn’t Mean Angler Reign Over (Threatpost)
2015-08-20 16:23

A SANS ISC report indicates a prominent cybercrime group has begun using the Neutrino Exploit Kit, but that hardly spells the end of the road for the notorious Angler EK.

Holes Patched in Online Bookmarking App Pocket (Threatpost)
2015-08-19 21:36

Developers with the service Pocket recently fixed some vulnerabilities that could have allowed users to exfiltrate data, including sensitive information regarding web services, internal IP...