011215 president barack obama
google hits misses google logo

Edward Snowden

Obama won't pardon Snowden, despite petition

The NSA leaker should return to the US and face charges, an Obama advisor says

abstract rack of servers datacenter networking hardware

Xen patches new virtual-machine escape vulnerability

A new vulnerability in emulation code used by the Xen virtualization software can allow attackers to bypass the critical security barrier between virtual machines and the host operating systems they run on.

darkode seized page

Darkode cybercrime forum might be making a comeback

The former administrator of Darkode, the online cybercrime forum that was recently shut down by law enforcement agencies, is preparing to bring it back, with better security and privacy for its members.

us surveillance spy ts

NSA will lose access to 'historical' phone surveillance data Nov. 29

After Nov. 29, data requests must be made on an as-needed basis to the FISA Court

malware

Over 10 million Web surfers possibly exposed to malvertising

The online advertising company that distributed the ads is taking action to stop it

rfid cards

Accuvant researchers to release open source RFID access tool

Security researchers have long known about the vulnerabilities of the RFID readers that many buildings use instead of door locks, but facilities managers have been slow to upgrade to more secure systems.

brinks safe

Brinks safe can be hacked with just a USB stick

Researchers popped open a safe with 100 lines of macro code

it security salaries

Cybersecurity job market to suffer severe workforce shortage

Cybersecurity workforce shortage to reach 1.5 million by 2019.

blue hole

Applying threat intelligence and what is the Dark Web?

In this edition of The Irari Report, Ira Winkler and Araceli Treu Gomes interview Kurt Stammberger of Norse Corporation about both what has come to be know as the Dark Web and Threat Intelligence. This is among the most comprehensive...

full disclosure

Hacked Opinions: Vulnerability disclosure – Sam Curry

Arbor Networks' Sam Curry talks about disclosure, bounty programs, and vulnerability marketing with CSO, in the first of a series of topical discussions with industry leaders and experts.

google drove logo

Google Drive phishing is back -- with obfuscation

If you have a Google account and a stranger sends you a link to a document on Google Drive, think twice before clicking -- it could be a phishing scam designed to harvest your Google credentials

emv chip

Predicting winners and losers in the EMV rollout

On October 1, the liability for credit card fraud shifts from card issuers to retailers that haven’t transitioned to accept cards that use new EMV technology. Some groups will be more ready than others.

android one touch buttons

Most Android phones can be hacked with a simple MMS message or multimedia file

Vulnerabilities in the Android multimedia framework allow attackers to remotely compromise devices with ease, a researcher said

video

The Irari Report: Threat Intelligence and the Dark Web

Ira Winkler and Araceli Treu Gomes chat with Kurt Stammberger from Norse Corp. about the Dark Web and how Threat Intelligence evolved in corporate environments.

jamie dimon

What can we learn from JPMorgan’s insider breaches?

Another former JPMorgan Chase & Co. (JPMC) employee was recently arrested by the FBI on charges of stealing customer data and trying to sell it. Similar incidents have occurred multiple times at JPMC over the past few years. Upon...

android security danger

Stagefright vulnerability allows criminals to send malware by text

Vulnerabilities in Android's "Stagefright" code allows criminals to send malware to any user via text message -- and the user gets infected without even having to open it.

Smartwatches

HP: 100% of smartwatches have security flaws

In a recent security assessment of ten smartwatches and their iOS and Android companion applications, every single watch had at least one significant security flaw, according to a new report from HP Fortify

healthcare security hp

US govt guide aims to bolster security of mobile devices used in health care

Health care providers are increasingly using smartphones and tablets for tasks such as accessing and transferring medical records, and submitting prescriptions, but these devices may not be secure enough to protect sensitive medical...

Load More