Quantum-powered RNG supplies pure entropy to crypto systems
Whitewood Encryption Systems has created Entropy Engine, a cost-effective, quantum-powered random number generator.The Entropy Engine employs quantum mechanics to solve the …
79% of companies release apps with known vulnerabilities
The application development process is rampant with security risks due to current business pressures, according to new research released at Black Hat USA 2015 by Prevoty. From …
Malicious advertisements surge! 260% spike in 2015
“RiskIQ announced at Black Hat USA 2015 its latest findings on the prevalence of malvertising across the nearly two billion publisher pages and 10 million mobile apps it …
Malvertisers abused Yahoos ad network for days
“A large-scale malvertising attack abusing Yahoos ad network has been hitting visitors of the Internet giant’s many popular and heavy-traffic sites for nearly a …
Hackers actively exploiting OS X zero-day to root machines, deliver adware
“Attackers are actively exploiting a zero-day privilege escalation vulnerability affecting the latest version of Apple’s OS. The bug’s existence has been …
Macs can be permanently compromised via firmware worm
“Security researchers Xeno Kovah and Trammell Hudson have discovered several flaws in the firmware installed on Apple computers, and have created a worm that can …
Chrome extensions easily disabled without user interaction
Independent researcher Mathias Karlsson has discovered a vulnerability that can be exploited to disable Chrome extensions without user interaction.Apparently, the bug has …
Health records of 5.5 million US patients accessed in MIE breach
The Indiana Attorney General’s Office has launched an investigating into the recent breach suffered by Medical Informatics Engineering (MIE) and its subsidiary …
Hacker steals Bitdefender customer info, blackmails company
A hacker has managed to access a database containing usernames and passwords of customers of Romanian AV maker Bitdefender, and has tried to blackmail the company into paying …
Hospitals advised to stop using vulnerable computerized drug pumps
The US Food and Drug Administration has issued a safety communication warning healthcare facilities using the Hospira Symbiq Infusion System – a computerized pump made …
The leading cause of insider threats? Employee negligence
Employee negligence, which may be caused by multitasking and working long hours, can result in insider threats and cost companies millions of dollars each year. It can cost a …
The rapid growth of the bug bounty economy
On average, nearly five high-to-critical priority vulnerabilities are found within the lifetime of a single program, according to Bugcrowd.Another observed trend includes the …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days