Proofpoint published research of never seen but heavily theorized Internet-of-Things cyber attack. They believe this is an industry first - standard household appliances such as smart TVs and Refrigerators used to send malicious and junk email accross the globe.
Wikileaks team and the World's most famous activist whistleblower are holding a talk in Saal 1 at Chaos Communication Congress in Hamburg, Germany.
According to documents released by Edward Snowden, NSA and GCHQ (UK version of NSA) use Google's cookies, primarily designed for interest-based ad-targeting, to identify their targets.
The official Website of U.S. Marines got hacked today by the hacktivist group Syrian Electronic Army following President Obama's announcement that he would seek congressional approvement for a military strike against Syria.
A new virus which is masquerading as a video message can hijack Facebook accounts and Google Chrome browsers.
News is spreading that google.ps was hacked by a Palestinian hacker group. The apparent google.ps hack actually consisted of posioning root DNS servers of the .ps TLD system. The DNS attack of course had political motives.
Department of Homeland Security issued an on Friday (02 Aug) following a vulnerability disclosure in all versions of the transport layer security (TLS) and secure sockets layer (SSL).
It seems more and more foreigners do their ATM hacking in Thailand. In the last 18 months over 10 groups of various nationalities have been arrested across Thailand for stealing.
Students from University of Texas at Austin were successful in spoofing GPS signals and steering $80m worth yacht off course. The experiment took place 30 miles off the coast of Italy while the yacht was sailing in international waters.
The famous German video game company Crytek recently took down 4 of it's websites. Apart from the usual "please change your password when you login", there's a chance the impact may be a bit further than just Crytek's websites.
Industry newsWe're reporting IT security news on a daily basis
- » APT 12 returns with new tools
- » New variant mobile worm
- » Google will help users surf safely
- » Microsoft employs hackers again
- » Xerox security vulnerability
- » FBI starts Operation Identity Shield
- » Black Hat reveals security issues again
- » A new Trojan hiding in e-mails
- » The fake Interpol site
- » Another Firefox exploit
- » 8000 websites defaced because of Lebanon war
- » New Microsoft update makes Windows incompatible
- » Firefox update fixes security issues
- » A Trojan in Firefox extension
AdvisoriesSecurity advisories by popular software Vendors
- iceweasel security update
Debian: DSA 3300-1
- Critical firefox security update
Red Hat: RHSA-2015:1207-01
- Important openstack-cinder security and bug fix
Red Hat: RHSA-2015:1206-01
- drupal7 7.38 updates
- drupal6 6.36 updates
- stunnel4 security update
Debian: DSA 3299-1
- Moderate CentOS 5 openssl Security Update
- jackrabbit security update
Debian: DSA 3298-1
VulnerabilitiesWhat's cooking right now?
- » High: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial o
- » High: ftagent.exe in EMC AutoStart 5.4.x and 5.5.x before 184.108.40.2068 HF4 allows remote attackers to execute
- » High: Cisco UCS Central Software before 1.3(1a) allows remote attackers to execute arbitrary commands via
- » High: libuv before 0.10.34 does not properly drop group privileges, which allows context-dependent attacke
- » Med: Cisco Unified Communications Manager 10.0(1.10000.12) allows local users to gain privileges via a co
- » High: The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.
- » High: The Windows Forms (aka WinForms) libraries in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1,
- » High: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8
- » High: Microsoft Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 SP1, Exce
- » High: Microsoft Office 2007 SP3 allows remote attackers to execute arbitrary code via a crafted document,
- » High: Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause
- » High: Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a den
- » High: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause