CNN is reporting that visitors to HuffPo and several other major sites last week might have caught a virus from malware infected Advertisements. The malware only infected Windows PCs and only those running Internet Explorer 8 (does anyone really use IE any more?). Even though IE11 is the current version of IE, according to CNN, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Katie Moussouris, formerly an executive at Microsoft and Symantec and now an executive at HackerOne, which as best as I can tell manages bug coordination with third parties for very large, well respected companies, tells a story about an over enthusiastic security person at Charles de Gaulle airport in Paris. She was tapped for secondary […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A presentation at the Chaos Communication Congress (a large hacker convention in Hamburg, Germany that attracted about 10,000 visitors this year – sort of, kind of, like Defcon here) demonstrated the ability to reproduce fingerprints of a target subject from just photographs. Reports in PC Magazine say that the researcher, Jan Krissler, took photographs of Ursula von […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Der Spiegel wrote an article on efforts by the NSA and GCHQ (their British equivalent) to crack encryption of various sorts. Take the article at what it is worth; it is based on documents that Snowden released, so it is a little bit old. I apologize that this post is pretty long, but there is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
BBC and others are reporting that a German steel mill was hacked. The report came not from the news media or the mill, but rather the German Federal Office for Information Security (BSI). As a result, not a lot of details are known, but the posting are new, so perhaps more information will come out […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
SC Magazine is reporting that a flaw signaling System 7, the telephone industry standard for setting up, managing and tearing down phone calls allows anyone to listen in on cell phone calls, read texts and locate a user. Two separate researchers have identified the flaw and are going to demonstrate it at a hackers conference […]
Continue reading →
[DISPLAY_ACURAX_ICONS]