Please turn on your JavaScript for this page to function normally.
https
HTTPS Bicycle attack reveals password length, allows easier brute-forcing

Dutch security researcher Guido Vranken has come up with a new attack that could allow attackers to discover the length of a user’s password – and therefore make …

complex
EFF: T-Mobile breaks net neutrality rules with Binge On service

In February 2015, the FCC has approved net neutrality rules “to preserve the Internet as a platform for innovation, free, expression and economic growth.” In …

Linode
Linode forces password reset for all users due to suspected breach

New Jersey-based virtual private server provider Linode can’t seem to catch a break. After being repeatedly hit with DDoS attacks from December 24 to early January, the …

binary
Flaw in Comcast’s home security system lets burglars in without triggering alarm

Rapid7 researcher Phil Bosco has discovered a crucial flaw in the Comcast XFINITY Home Security system, which can be easily exploited by burglars to enter homes without …

Heartbeat
When hacking saves lives: Hacking medical devices and implants

Of all the IoT devices out there, none are more crucial to users than the medical devices that help them simplify the management of certain medical conditions or, in the most …

Android
January Android security update fixes 5 critical flaws, removes unneeded component

Google has released the January security update for Android (for its Nexus devices). The update fixes 12 issues, five of which are critical. The most important hole …

code
De-anonymizing code authors by analyzing executable binaries

A group of researchers that have previously proven that it’s possible to de-anonymize programmers by analysing the source code of programs they have created, have now …

Glass
BlackEnergy APT is back, deleting files and killing computer systems

The BlackEnergy APT – or SandWorm group, as some researchers call it – has been active since 2007 (at least). Its past exploits include cyber-espionage campaigns …

Cisco Jabber
Cisco Jabber flaw allows MitM attackers to wiretap communications

A vulnerability in Cisco’s Jabber client for Windows can be exploited by attackers to wiretap communications, steal user credentials, and to tamper with messages sent …

Tor project
The Tor Project announces bug bounty program

Representatives of the Tor Project, the non-profit organization that maintains the software needed for using the Tor anonymity network and operates the Onion network, have …

Fire
Difficult to block JavaScript-based ransomware can hit all operating systems

A new type of ransomware that still goes undetected by the great majority of AV solutions has been spotted and analyzed by Emsisoft researchers (via Google Translate). …

Juniper Networks
Who planted the backdoors in Juniper’s firewalls?

Who put the recently discovered “unauthorized code” in ScreenOS, which effectively opened a backdoor in Juniper’s NetScreen firewall devices and allowed …

Don't miss

Cybersecurity news