Security News

Cisco Patches Authentication Bypass in Cisco Prime Home (Threatpost)
2017-02-03 15:23

Cisco patched a critical remote authentication bypass vulnerability in its Prime Home remote management tool used by service providers.

Microsoft Waits for Patch Tuesday to Fix SMB Zero Day (Threatpost)
2017-02-03 13:36

Microsoft said a Windows SMB zero day, which has a public proof-of-concept exploit available, is low risk and won’t be patched until an upcoming Patch Tuesday.

WordPress Silently Fixed Privilege Escalation Vulnerability in 4.72 Update (Threatpost)
2017-02-02 19:57

WordPress silently fixed a serious content injection vulnerability when it pushed out its latest security release, 4.7.2, last week

Printing and Marketing Firm Leaks High-Profile Customers’ Data (Threatpost)
2017-02-02 19:56

MacKeeper says it has found gigabytes of sensitive personal data stored by PIP Printing and Marketing Services and accessible online.

Google Adds Security Key Enforcement to G Suite Apps, Hosted S/MIME to Gmail (Threatpost)
2017-02-02 17:33

Google pumped more life into the use of physical keys as a second form of authentication when it added Security Key enforcement support to G Suite.

HTTPS Hits 50 Percent Traffic Milestone (Threatpost)
2017-02-01 20:08

This week Let's Encrypt hit a huge milestone. According to a two-week survey of telemetry data from the Mozilla Firefox browser, 50 percent of page loads used HTTPS.

Latest Ubuntu Update Includes OpenSSL Fixes (Threatpost)
2017-02-01 19:50

Ubuntu users are encouraged to update their operating systems to the latest OpenSSL package versions to address a collection of vulnerabilities.

Zimperium Program Buys Exploits for Patched Mobile Vulnerabilities (Threatpost)
2017-02-01 14:40

Zimperium announced Tuesday its N-Days Exploit Acquisition Program that will reward researchers for Android and iOS exploits.

Trump Cyber Executive Order Calls for 60-Day Review (Threatpost)
2017-02-01 12:00

President Donald Trump postponed the release and signing of an Executive Order around cybersecurity that calls for a 60-day review systems and critical infrastructure.

Flaws Found in Popular Printer Models (Threatpost)
2017-01-31 20:27

Researchers have found a half-dozen flaws in popular printer models that allow attackers to do everything from steal print jobs to conduct buffer overflow attacks.