Canada's Police Chiefs Want New Law To Compel People To Reveal Passwords
Reader DaveyJJ writes: CBC is reporting that the Canadian Association of Chiefs of Police, has passed a resolution calling for a legal measure to unlock digital evidence, saying criminals increasingly...
View ArticleWindows UAC Bypass Permits Code Execution
msm1267 writes from a report via Threatpost: A Windows UAC bypass has been publicly disclosed that not only bypasses the security feature meant to prevent unauthorized installs, but can be used to run...
View ArticleSnowden Speculates Leak of NSA Spying Tools Is Tied To Russian DNC Hack
An anonymous reader quotes a report from Ars Technica: Two former employees of the National Security Agency -- including exiled whistleblower Edward Snowden -- are speculating that Monday's leak of...
View ArticleMalware That Fakes Bank Login Screens Found In Google Ads
tedlistens quotes a report from Fast Company: For years, security firms have warned of keystroke logging malware that surreptitiously steals usernames and passwords on desktop and laptop computers. In...
View ArticleIntel To Manufacture Rival ARM Chips In Mobile Push
An anonymous reader writes: Chip maker Intel has entered an unlikely partnership with British semiconductor firm ARM in an effort to boost opportunities for its foundry business. The licensing...
View ArticleCisco Patches 'ExtraBacon' Zero-day Exploit Leaked By NSA Hackers
Patrick O'Neill quotes a report from The Daily Dot: After a group of hackers stole and published a set of NSA cyberweapons earlier this week, the multibillion dollar tech firm Cisco is now updating its...
View ArticlePeople Ignore Software Security Warnings Up To 90% of the Time, Says Study
An anonymous reader quotes a report from Phys.Org: A new study from BYU, in collaboration with Google Chrome engineers, finds the status quo of warning messages appearing haphazardly -- while people...
View ArticleMillions Of Steam Game Keys Stolen After Hacker Breaches Gaming Site
An anonymous reader writes:A little over nine million keys used to redeem and activate games on the Steam platform were stolen by a hacker who breached a gaming news site last month. The site, DLH.net,...
View ArticleHow The US Will Likely Respond To Shadow Brokers Leak
blottsie writes: The NSA and FBI are both expected to investigate the leak of NSA-linked cyberweapons this week by an entity calling itself the Shadow Brokers, experts with knowledge of the process...
View Article'Smart' Electrical Socket Leaks Your Email Address, Can Launch DDoS Attacks
An anonymous reader writes from a report via Softpedia: There is an insecure IoT smart electrical socket on the market that leaks your Wi-Fi password, your email credentials (if configured), and is...
View ArticleMalware Infected All Eddie Bauer Stores In US, Canada
New submitter alir1272 quotes a report from Krebs On Security: Clothing store chain Eddie Bauer said today it has detected and removed malicious software from point-of-sale systems at all of its 350+...
View ArticlePassword Strength Meters on Websites Are Doing a Terrible Job
An anonymous reader shares a report on The Register: Password strength meters used during web sites' signup process remain incapable of doing their job, says Compound Eye developer Mark Stockley....
View ArticleThe NSA Leak Is Real, Snowden Documents Confirm
Sam Biddle, reporting for The Intercept: On Monday, A hacking group calling itself the "ShadowBrokers" announced an auction for what it claimed were "cyber weapons" made by the NSA. Based on...
View ArticleAmazon To Experiment With Part-Time Tech Teams
Elizabeth Weise, reporting from USATODAY: In an effort to lure hard-to-hire tech workers and possibly recast its reputation as a harsh workplace, Amazon plans to pilot a program of part-time teams...
View ArticleComputer Science Professor Mocks The NSA's Buggy Code
After performing hours of analysis, a computer science professor says he's "not impressed" by the quality of the recently-leaked code that's supposedly from an NSA hacking tool. An anonymous Slashdot...
View ArticleAppliance Companies Are Lobbying To Protect Their DRM-Fueled Repair Monopolies
Electronics companies Dyson, LG, and Wahl are fighting right-to-repair legislation, Motherboard reported Wednesday, citing letters it has obtained. From a report: The manufacturers of your appliances...
View ArticleBezop Cryptocurrency Server Exposes Personal Info of 25,000 Investors
lod123 shares a report from Threatpost: A leaky Mongo database exposed personal information, including scanned passports and driver's licenses, of 25,000 investors and potential investors tied to the...
View ArticleNew C# Ransomware Compiles Itself at Runtime
From a report: A new in-development ransomware was discovered that has an interesting characteristic.lees meer
View ArticleSki Lift In Austria Left Control Panel Open On the Internet
An anonymous reader writes: Officials from the city of Innsbruck in Austria have shut down a local ski lift after two security researchers found its control panel open wide on the Internet, and...
View ArticleUber Tightens Bug Bounty Extortion Policies Following 2016 Data Breach
lod123 shares a report from Threatpost: Uber is tightening policies around its bug-bounty program after a 2016 data breach exposed deep flaws in its policies around handling extortion.lees meer
View ArticleCode Published for Triggering a BSOD on Windows Computers -- Even If They're...
"A Romanian hardware expert has published proof-of-concept code on GitHub that will crash most Windows computers within seconds, even if the computer is in a locked state," writes BleepingComputer. An...
View ArticleMan Sues Nation For Allegedly Seizing France.com, a Domain He Has Owned For...
A French-born American has now sued his home country because, he claims, the Ministry of Foreign Affairs has illegally seized a domain that he's owned since 1994: France.com. From a report: In the...
View ArticleLong Prison Sentence for Man Who Hacked Jail Computer System To Bust Out Friend
A judge sentenced a Michigan man to 87 months -- 7 years 3 months -- in prison for hacking into a county jail's computer system and modifying prisoner records in an attempt to get an inmate released...
View ArticleVolkswagen, Audi Cars Vulnerable To Remote Hacking
An anonymous reader writes: "A Dutch cyber-security firm has discovered that in-vehicle infotainment (IVI) systems deployed with some car models from the Volkswagen Group are vulnerable to remote...
View ArticleStarting Today, Google Chrome Will Show Warnings for Non-Logged SSL Certificates
Starting today, Google Chrome will show a full-page warning whenever users are accessing an HTTPS website that's using an SSL certificate that has not been logged in a public Certificate Transparency...
View ArticleFTC Gives Sony, Microsoft, and Nintendo 30 Days To Get Rid of Illegal...
Matthew Gault, reporting for Motherboard: The Federal Trade Commission put six companies on notice in early April for illegally telling customers that getting third-party repairs voids the warranty on...
View ArticleAmazon Tells Signal's Creators To Stop Using Anti-Censorship Tool
An anonymous reader quotes a report from The Verge: The team behind secure messaging app Signal says Amazon has threatened to kick the app off its CloudFront web service unless Signal drops the...
View ArticleScammers Are Using Google Maps To Skirt Link-Shortener Crackdown, Redirect...
According to security company Sophos, scam websites have been using obfuscated Google Maps links to redirect users to dodgy websites. The Register reports: The reason for this is Google's recent...
View ArticleGitHub Accidentally Exposes Some Plaintext Passwords In Its Internal Logs
GitHub has sent an email to some of its 27 million users alerting them of a bug that exposed some user passwords in plaintext. "During the course of regular auditing, GitHub discovered that a recently...
View ArticleA Critical Security Flaw in Popular Industrial Software Put Power Plants At Risk
A severe vulnerability in a widely used industrial control software could have been used to disrupt and shut down power plants and other critical infrastructure. From a report: Researchers at security...
View Article
More Pages to Explore .....