86,800 network printers open to the whole internet – is one of them yours?
Last week, it was programmers uploading their private keys to public websites. This week, it’s private printers left openly on the public internet. In the words of a famous software company, “Where do you want to print today?” more…Apple Officially Announces iOS 6.1
Apple has published an official press release for iOS 6.1 and revealed that nearly 300 million devices are now on iOS 6. Tags: Apple iOS more…Apple updates iOS fixing 27 vulnerabilities and TURKTRUST revocation
Apple has released updates for users of the iPod Touch, iPhone, iPad and Apple TV products that fix critical vulnerabilities. Apple users should update their devices to iOS 6.1 as soon as possible. more…Point of sale devices and Canadian banks targeted by Citadel malware variant
A new variant of the prevalent Citadel crimeware kit has been discovered to target Point of Sale (POS) devices. Find out more, in this analysis from SophosLabs expert James Wyke. more…How to find single women who like men *and* like getting drunk, with Facebook Graph Search
Check what you share on your Facebook account *before* Facebook Graph Search is rolled out to a wider audience – or else prepare to suffer the consequences.. more…Hackers play Asteroids on US government websites
To have one website fall foul of Asteroid-loving hackers may be regarded as a misfortune; but to have two looks like carelessness. more…Twitter ordered to unmask hate speakers
Months after hate speech was taken down from Twitter, a French court has ordered the company to hand over details of users who posted anti-Semitic content. Is the uncloaking of the haters worth the erosion of privacy? more…Anatomy of a phish – how crooks hack legitimate websites to steal your details
Are you a “safe surfer”? What about sites that were perfectly good yesterday, but today are serving phishing pages for the crooks? Paul Ducklin takes you on a four-country phishing trip… more…Facebook Hackercup 2013 Qualification Round Solutions
1- Beautiful Strings The problem statement is given below: When John was a little kid he didn’t have much to do. There was no internet, no Facebook, and no programs to hack on. So he did the only thing he could… he evaluated the beauty of strings in a quest to discover the most beautiful […] more…Pirated App Stores on iOS?
In the past couple of weeks, there has been some breathless reporting about how iOS users could now install pirated apps without having to jailbreak their phones. This was made possible by certain Chinese app store-like services. Some of the reporting has been wondering how this was possible, but anyone with knowledge of iOS enterprise […] more…Pornographic video clips already showing up on Twitter’s Vine
Less than a week after Twitter unveiled Vine, the video-sharing app apparently has developed a porn problem. Released Thursday, the app for iPhone and iPod Touch lets anyone create and share six-second clips, but it also has become a popular venue for male genitalia and pornographic movies taped off TVs and laptops. As first pointed […] more…Nokia to offer paid upgrade to Lumia-only music service
A few months after jumping in to the free music streaming sector, Nokia is getting ready to give its Lumia-only service a jump-start with a premium upgrade. Nokia Music+, an upgrade to the free Mix Radio service that Nokia launched last September, will offer Lumia owners unlimited skips and unlimited downloads, the Finnish handset maker […] more…Improving signal-to-noise in risk management
One of the most important responsibilities of the information security professional (or any IT professional, for that matter) is to help management make well-informed decisions. Unfortunately, this has been an elusive objective when it comes to risk. Although we’re great at identifying control deficiencies, and we can talk all day long about the various threats […] more…Graph Search raises privacy concerns from security experts
Facebook’s new Graph Search has security experts warning people who use the social network to raise their privacy settings in order to avoid embarrassment or becoming victims of cybercriminals. Graph Search, which Facebook introduced this month and is rolling out gradually, lets people use naturally phrased queries, such as “Mexican restaurants my friends like,” and […] more…Fujitsu developing HTML5-based security app for corporate smart phones
Engineers at Fujitsu Laboratories are developing an HTML5-based platform for smart phones that designed to keep corporate data secure when accessed from employee-owned handsets. The system, which Fujitsu plans to launch later this year, is one of a number that addresses this increasingly common problem: how to allow workers access to corporate IT systems while […] more…The end of the line for Symbian
Buried deep within Nokia’s press release about its financial results, there’s a line that pretty much signals the end of one of the most popular and successful mobile operating systems in history. With Nokia retiring its use, Symbian is no more. Tags: Symbian Nokia Software-Programming more…More information
- Industrial Giants Schneider Electric and Emerson Named as Victims of Oracle Hack
- Apple’s new tool will make it easier for law enforcement to request data
- Hackers can clone Google Titan 2FA keys using a side channel in NXP chips
- The Spotify Phishing Scam: How to Reel in This Cyberthreat
- Citrix Patches Hypervisor Vulnerabilities Allowing Host Compromise
- Windows SMB 0-Day Risk Downplayed
- Web Shells: Types, Mitigation & Removal
- Serious Security: The Samba logon bug caused by outdated crypto
- Best tools for email encryption
- Chrome wants to help you stop recycling the same damn passwords