Security News

Half of Chrome Pageloads are HTTPS (Threatpost)
2016-11-04 15:32

Google said that more than half of pageloads on Chrome across platforms are encrypted; Android as the lone laggard, but trending upward.

Test-Run DDoS Attacks Against Liberia Cease (Threatpost)
2016-11-04 15:05

Intermittent DDoS attacks affecting Internet connectivity nationwide in West African nation Liberia have ceased. One researcher says it’s a test for something else.

DMCA Exemptions Lift Hacking Restrictions (Threatpost)
2016-11-03 19:25

White hat hackers can hack cars, medical devices and home IoT devices without fear of running amiss of DMCA laws that prevent reverse engineering.

Outlook Web Access Two-Factor Authentication Bypass Exists (Threatpost)
2016-11-03 19:15

Two-factor authentication protecting Outlook Web Access and Office 365 portals can be bypassed-and the situation likely cannot be fixed, a researcher has disclosed.

GitLab Patches Command Execution Vulnerability (Threatpost)
2016-11-03 18:50

Developers with GitLab fixed a critical vulnerability in the open source repository manager that could have allowed the theft of application files, tokens, or secrets.

Cisco Patches Critical Bugs in 900 Series Routers, Prime Home Server (Threatpost)
2016-11-03 15:06

Cisco Systems has issued two critical advisories addressing flaws in its 900 Series Routers and its Cisco Prime Home server.

Unpatched Vulnerability on Wix.com Puts Millions of Sites at Risk (Threatpost)
2016-11-02 21:36

Wix websites are vulnerable to reflective DOM cross-site scripting attack that could give attackers control of user’s websites.

Mitigations Available for PanelShock Vulnerabilities in Schneider Electric Magelis HMIs (Threatpost)
2016-11-02 18:24

Schneider Electric has recommended a number of mitigations to ward off two critical vulnerabilities in its Magelis HMI products.

Critical MySQL Vulnerabilities Can Lead to Server Compromise (Threatpost)
2016-11-02 18:02

Critical vulnerabilities in MySQL and database servers MariaDB and PerconaDB can lead to arbitrary code execution, root privilege escalation, and server compromise.

Belkin’s WeMo Gear Can Hack Android Phones (Threatpost)
2016-11-02 16:25

Vulnerabilities in WeMo home automation devices can be used to attack the Android apps used to manage devices remotely.