Paying For Content
I remember setting up our first website. That was 20 years ago, in 1994. When the Web was very young and there were only a handful of websites, it was easy to forecast that the Web was going to grow. And indeed, during these past 20 years, it has exploded in size. What’s even more […] more…Understanding the WordPress Security Plugin Ecosystem
As a child, did you ever play that game where you sit in a circle and one person is responsible for whispering something into one persons ear, and that message gets relayed around the circle? Wasn’t it always funny to see what the final message received would be? Oh and how it would have morphed […] more…Just how much information can be squeezed from one week of your metadata?
Thanks to a Dutch man who volunteered to let researchers snoop on his mobile phone, we now have a glimpse of the type of information that can be squeezed from what officials would have us believe is “just” metadata. Toss in a list of exposed passwords hints courtesy of Adobe, and analysts also got access […] more…Train security as critical as planes and automobiles
In recent weeks you’ve heard a lot of discussion around the cyber risks to aircraft and automobiles. After the Black Hat, DefCon and BSides conferences in Las Vegas, Nev., in July, it would seem that a great deal of necessary attention will be paid to the security of design and implementation of these two key […] more…Cydia’s Popular BigBoss Repo Allegedly Gets Hacked
BigBoss, one of the biggest and most popular Cydia repositories, has allegedly been hacked. Attackers “Kim Jong-Cracks” claim to have gained access to all packages — including paid titles — and made them available for free via their own repo. Cydia users are advised to steer well clear of it, however. Tags: Security Industry News more…Being Secure In The Most Connected World Cup Ever
Sporting events are getting more and more connected, and the just-concluded World Cup is no exception. Brazilian telecom provider Oi made sure that no expense was spared in ‘connecting’ the World Cup , and even claimed that this year’s event is in fact the most connected in the history of the World Cup. Oi claims that they […] more…Securing the Internet of Everything
Whenever I hear about the Internet of Everything, I find myself somewhat conflicted. There’s no doubt that it is the new “mega trend” in technology, but at the same time I wonder how secure it is. Let me explain. When a company creates a smart device, they not only need to create the hardware for […] more…Spam in May 2014
Spam in the spotlight In the run-up to the summer, spammers offered their potential customers seedlings and seeds for gardening. In addition, English-language festive spam in May was dedicated to Mother’s Day – the attackers sent out adverts offering flowers and candies. Holiday spam for Mom As usual, the spammers were very busy in the […] more…VirusTotal API implementation in C programming language
Many users interact programmatically with VirusTotal via its public API, it is an easy HTTP+JSON interface that allows you to easily submit and check files in order to help improve security world-wide. Moreover, many VirusTotal Community volunteers have very kindly implemented the API in a wide variety of programming languages, some of these implementations are […] more…Wi-Fi security and fake ac/dc charges threaten your data at the 2014 World Cup
When we’re traveling we tend to bring lots of smart devices with us. It’s great to be able to share a beautiful photo, let people know where you are or put your latest news on Twitter or Facebook. It’s also a good way to find info about restaurants, hotels and transport connections. But to do […] more…Area41, formerly known as …
Gruezi from Zurich, Switzerland, where the Area41 conference is currently being held. Area41 doesn’t ring a bell? Well, this event went under a renaming process and was formerly known as Hashdays, that took place in Lucerne. However, the steering team behind it still is the DEFCON Switzland group. And they have found a fantastic venue! […] more…Failure Is the Best Thing That Could Happen to Google Glass
Today, for one day only, Google Glass goes on sale to everyone in the U.S. Everyone, that is, with an extra $1,500 to spare and a desire to become a guinea pig in a hotly contested social experiment. It’s not a stretch to say that this little test, the first that hasn’t been geared to […] more…RSA Conference 2014: The Way Forward
I attended the RSA 2014 Conference in San Francisco, which has held about two weeks ago. This year the conference offered new insights to today’s threat landscape, which will help us all plan for and protect users in 2014 and beyond. Largest Security Conference of 2014 The attendance numbers for RSA are always impressive: this […] more…TrustyCon Video
TrustyCon, the first “Trustworthy Technology Conference” was held yesterday in San Francisco. And Google/YouTube volunteered a camera crew. Nice! The full event can be viewed here: Mikko’s presentation begins at 15 minutes and 45 seconds. Other speakers: Alex Stamos, Cindy Cohn, Marcia Hofmann, Christopher Soghoian, Joseph Menn, Bruce Schneier, Garrett Robinson, Yan Zhu, Chris Palmer, […] more…The "Talking Angela" chain letter: Three tips to help you avoid Facebook hoaxes
The “Talking Angela” chain letter, which tells a scary but unsubstantiated security story about a popular game, is spreading again. Here are three tips to help you steer clear of security hoaxes on Facebook… more…The “Talking Angela” chain letter: Three tips to help you avoid Facebook hoaxes
The “Talking Angela” chain letter, which tells a scary but unsubstantiated security story about a popular game, is spreading again. Here are three tips to help you steer clear of security hoaxes on Facebook… more…More information
- Resolved: Voice System Upgrade Work
- Microsoft to rebrand ‘Windows Azure’ as ‘Microsoft Azure’
- Windows 11: A guide to the updates
- Resolved: WebMail hardware failure
- Microsoft Edge CVE-2017-0135 Security Bypass Vulnerability
- US Charges Russian Involved in 2013 Hacking of Neiman Marcus, Michaels
- Hackers Targeting Amazon Third-Party Sellers With Password Reuse Attacks
- Flaws in IBM QRadar Allow Remote Command Execution
- The Federal Bureau of Investigation (FBI) officially linked the Diavol ransomware operation to the infamous TrickBot gang.
- Israel-Based Vendor Cellebrite Can Unlock Every iPhone, including the Current-Gen iPhone X