vulnerability
Windows flaw allows access to data after accounts are revoked
A disabled account in Windows’ network does not take effect immediately, according to Aorato. In fact, due to design considerations disabled accounts – and the …
Researchers debunk severity of OAuth “Covert Redirect” bug
Late last week, a Ph.D. student at the Nanyang Technological University in Singapore made the information security world pause for a moment by claiming that he had found a …
A hybrid approach to web app security assessment
High-Tech Bridge is introducing its hybrid web application security assessment SaaS, ImmuniWeb for the first time ever to visitors at Infosecurity Europe 2014. The service, …
Defacement mitigator for cybersecurity protection
At Infosecurity Europe 2014, Foresight released Defacement Mitigator, the first cloud-based web security solution that provides full defacement mitigation and protection to …
XSS bug in popular Chinese site exploited to launch DDoS attack
DDoS mitigation firm Incapsula has put a stop to the speculations that the video content provider whose vulnerable website was misused to launch a DDoS attack was YouTube, and …
Mozilla offers $10,000 for bugs in its new cert verification library
In the wake of the recent discoveries of the Heartbleed OpenSSL bug and the SSL “gotofail” bug, Mozilla has announced a new and topical bug bounty program: it …
FBI informant Sabu directed hacking of foreign govt sites
Hector Xavier Monsegur (aka “Sabu”), the infamous hacker and leader of the Lulzsec hacktivist group, has directed his associates to attack and compromise the …
NetSupport vulnerabilty allows information leakage
NetSupport is an application that allows corporations to remotely manage and connect to PCs and servers from a central location, to provide desktop support. I wrote a script …
Amazon Cloud Service servers riddled with vulnerabilities
Update with comment from Amazon available below. An investigation spurred by one of the customers of their security product has lead researchers of security company Bkav to an …
The dismal state of SATCOM security
Satellite Communications (SATCOM) play a vital role in the global telecommunications system, but the security of the devices used leaves much to be desired, says Ruben …
Tor relays vulnerable to Heartbleed dropped from anonymity network
Thanks to the OpenSSL Heartbleed bug, the Tor anonymity network is set to temporarily lose around “12 per cent of the exit capacity and 12 per cent of the guard …
Heartbleed threatens mobile users
As time passes, it becomes more and more obvious that almost no-one is safe from the danger created by the existence of the OpenSSL Heartbleed bug. In the days after the …
Don't miss
- Preparing financial institutions for the next generation of cyber threats
- SEC and FCA fines: Issues jump
- Europeans targeted with new Tor-using backdoor and infostealers
- Apple zero-day vulnerability exploited to target iPhone users (CVE-2025-24085)
- BloodyAD: Open-source Active Directory privilege escalation framework