Kategorie
Supervalu breach shows why move to smartcards is long overdue
The data breach disclosed by Supervalu is another reminder about why the ongoing migration of the U.S. payment system to smartcard technology can't happen fast enough.
Kategorie: Hacking & Security
Grocery stores in multiple states hit by data breach
A data breach at Supervalu Inc., one of the largest grocery wholesalers and retailers in the U.S., could affect thousands of people who shopped at the company's stores in June and July.
Kategorie: Hacking & Security
Tor – Xác định các exit relay độc hại
1. Mở đầu
Bài viết này là phần mô tả sơ lược và bình luận bài báo "Spoiled Onions: Exposing Malicious Tor Exit Relays"[1].
Tor exit relay là nút cuối dùng trong hành trình vận chuyển của các gói tin trọng mạng Tor, gói tin từ đây sẽ đi đến địa chỉ ...
Kategorie: Hacking & Security
Ferguson's tiny IT operation in the maelstrom
Ferguson, Mo., the city now in the midst of protests over a fatal police shooting, runs the type of IT department that gets almost no attention.
Kategorie: Hacking & Security
[writeup] Hacklu 2012 – Challenge #13 – The Sandbox Terminal
Solved by w00d @ clgt
Thanks g4mm4 for giving many suggestions and draft the first version of the exploit
13 - The Sandboxed Terminal (400)
Since the zombie apocalypse started people did not stop to ask themselves how the whole thing began. An abandoned military base may lead to answers but after infiltrating ...
Kategorie: Hacking & Security
Tennessee firm blames bank for $193K cybertheft
A lawsuit filed in Tennessee earlier this month has resurfaced questions about a bank's responsibility in protecting customers against cyberheists.
Kategorie: Hacking & Security
The making of a cybercrime market
I recently had the opportunity to speak with two representatives from the Netherlands-based security research firm Fox-IT--Maurits Lucas, InTELL Business Director, and Andy Chandler, VP of WW Sales & Marketing. Collectively, the two shared an in-depth story of cybergang warfare suitable for Hollywood.
Kategorie: Hacking & Security
Windows tech support scammers take root in the U.S.
In a new trend, Windows tech support scams have gone home-grown, with twists that include bogus warnings from malicious websites urging users to call a toll-free number for "help."
Kategorie: Hacking & Security
Update: Payment cards with chips aren't perfect, so encrypt everything, experts say
There's a push to adopt chip-equipped payment cards in the U.S. following high-profile breaches at large retailers and restaurant chains during the past 12 months, but experts warn that switching to this payment system will not make fraud disappear.
Kategorie: Hacking & Security
At Defcon, hacker coalition calls for safer computer systems in vehicles
A collective of security researchers issued a letter Friday from the DefCon hacker conference in Las Vegas urging the automotive industry to adopt five principles for building safer computer systems in vehicles.
Kategorie: Hacking & Security
Payment cards with chips aren't perfect, so encrypt everything, experts say
There's a push to adopt chip-equipped payment cards in the U.S. following high-profile breaches at large retailers and restaurant chains during the past 12 months, but experts warn that switching to this payment system will not make fraud disappear.
Kategorie: Hacking & Security
Emerging networking tech used by Apple, Cisco frustrates firewalls
Today's security software is ineffective against an emerging networking technology already in use by Apple for its Siri voice-recognition software, according to research presented at the Black Hat hacking conference this week.
Kategorie: Hacking & Security
Some mobile POS devices still have critical flaws months after patch
Security researchers demonstrated Thursday flaws that can allow hackers to take over mobile point-of-sale (mPOS) devices from different manufacturers by inserting rogue cards into them.
Kategorie: Hacking & Security
Russian credential theft shows why the password is dead
News that Russian hackers amassed log-in credentials belonging to more than 1.2 billion Internet users hammers home why companies that have not implemented strong authentication measures really need to get moving on it.
Kategorie: Hacking & Security
Carriers' remote control software still puts mobile devices at risk
Vulnerabilities found in remote management software that carriers insist be installed on smart phones and other mobile-enabled devices they sell are likely to put many devices at risk of compromise for some time to come.
Kategorie: Hacking & Security
U.S. agencies halt background checks by contractor after cyberattack
Two U.S. federal agencies have halted background checks with a contractor that said Wednesday its networks had been breached in a cyberattack suspected to have been coordinated by an unnamed country.
Kategorie: Hacking & Security
Could drones get X-ray vision through Wi-Fi?
Researchers have developed mobile robots that can use Wi-Fi signals to effectively "see through" walls. It's raising the possibility of flying drones using the technology to see inside buildings.
Kategorie: Hacking & Security
Five unanswered questions about massive Russian hacker database
There's still much that's unclear about Tuesday's revelation that a small group of hackers in Russia have amassed a database of 1.2 billion stolen user IDs and passwords. The company that disclosed the incident, Hold Security, didn't offer any fresh information Wednesday, but here are five questions we'd like to see answered (and a bonus one that we already know the answer to).
Kategorie: Hacking & Security
Massive Russian hack has researchers scratching their heads
Don't worry, you're not the only one with more questions than answers about the 1.2 billion user credentials amassed by Russian hackers.
Kategorie: Hacking & Security
Russian hackers amass 1.2B stolen Web credentials
Criminals in Russia have amassed a huge database of 1.2 billion stolen user names and passwords and half a billion email addresses, a U.S.-based Internet security company said Wednesday.
Kategorie: Hacking & Security
- « první
- ‹ předchozí
- …
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- …
- následující ›
- poslední »
