aris_67

88 Added | 1 Magazine | 7 Following | @aris_67 | Keep up with aris_67 on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “aris_67”

Google encrypts Gmail between data centers to keep the NSA out of your inbox

Google just announced that as of today, Gmail is more secure than ever before. And the company isn't hiding the fact that it's actively trying to stop the government from spying on your email activity. Google says that Gmail will now use a secure HTTPS connection whenever you check or send email, …

iOS 7 Bug Allows Disabling of 'Find My iPhone' Without Password

A bug in the current version of iOS 7 appears to allow users to disable Find my iPhone on a device without typing in a password, which effectively hides it from being located on iCloud.com.<p>Deactivating Find My iPhone takes just a few simple steps and it can be easily repeated on devices running the …

The Internet is Owned--Act Accordingly

<b>PUNTA CANA</b>—Costin Raiu is a cautious man. He measures his words carefully and says exactly what he means, and is not given to hyperbole or …

Cost of Doing APT Business Dropping

<b>PUNTA CANA</b>–The term APT often is used as a generic descriptor for any group–typically presumed to be government-backed and heavily financed–that is …

Massive Target data breach may have been caused by a Russian teenager

The security breach that impacted 70 million Target customers last month may have been caused by malware created by a 17-year-old Russian hacker. While the suspected teenager wasn't actually responsible for perpetrating the attacks, he did reportedly write the software, known as BlackPOS, that was …

Java Primary Cause of 91 Percent of Attacks: Cisco

There are many different risks and attacks that IT professionals had to deal with in 2013, but no one technology was more abused or more culpable …

Hackers pilfer credit card data from Neiman Marcus customers | Ars Technica

Luxury retailer now is not sure how many customers were affected by the hack.<p>On Friday evening, luxury retailer Neiman Marcus admitted that it had …

What's wrong with in-browser cryptography?

Above image taken from Douglas Crockford’s <i>Principles of Security</i> talkIf you’re reading this, then I hope that sometime somebody or some web site told …

Information Security

Don't Want Your Laptop Tampered With? Just Add Glitter Nail Polish

HAMBURG – If you're traveling overseas, across borders or anywhere you're afraid your laptop or other equipment might be tampered with or examined, …

The NSA Reportedly Has Total Access To The Apple iPhone

As with most good stories, revelations of the NSA spy program will almost certainly keep getting worse before anything gets better.<p>Yesterday we reported on claims—based on leaked NSA documents—that the spy agency was rerouting laptops ordered online to install spyware and malicious hardware on the …

Apple Says It Has Never Worked With NSA To Create iPhone Backdoors, Is Unaware Of Alleged DROPOUTJEEP Snooping Program

Apple has contacted TechCrunch with a statement about the DROPOUTJEEP NSA program that detailed a system by which the organization claimed it could snoop on iPhone users.<p>Apple says that it has never worked with the NSA to create any ‘backdoors’ that would allow that kind of monitoring, and that it …

Microsoft joins FIDO group hoping to replace passwords with public key cryptography | Ars Technica

FIDO Alliance imagines a future in which our devices do the authentication for us.<p>Microsoft has joined the board of directors of the FIDO ("Fast …

What can we expect next year? - Help Net Security

WatchGuard revealed its annual security predictions for 2014. Assembled by WatchGuard’s security research team, the list includes expected advances …

DNS Registrar Fixes Hijack Vulnerability

UPDATE: The domain registrar and Web-hosting company Namecheap has fixed a cross-site request forgery vulnerability in its DNS setup page. According …

CryptoLocker Ransomware Now Spreading Through Removable Drives

<b>During the past few months, advancements in CryptoLocker put ransomware on the public's radar in a major way.</b><p>But according to researchers at Trend …

A Cyber Security New Year's Resolution: Simplify Security

As the year comes to close and we look ahead to 2014, many of us turn our attention to New Year’s resolutions. Losing weight, quitting smoking or …

News from the Lab Archive : January 2004 to September 2015

Posted by Mikko @ 21:46 GMT<p>23rd of December 2013<p>An Open Letter to:<br>Joseph M. Tucci - Chairman and Chief Executive Officer, EMC<br>Art Coviello - Executive …

Stanford Researcher Proves NSA Can Probably Identify Individuals From Phone Records

The National Security Agency likes to claim that intelligence officers are only collecting the phone records of millions of Americans, safely omitting their actual names from analysis. But a Stanford researcher, Jonathan Mayer, found that he and his co-author could easily match so-called …

F-Secure

<i>As 2013 winds to a close, there’s no denying it’s been a fascinating year – and no one agrees more than Mikko Hypponen, malware adventurer, famed TED</i> …

More Colleges Offer Programs in Cybersecurity

Schools take various approaches to training students for careers in IT security<p>When Michael Kaiser speaks at cybersecurity conferences, he likes to survey the audience to see how many taught themselves the skills they use in their cybersecurity-related jobs.<p>"It used to be 100%, now it is 95%," says …

Cybersecurity

Study: The cost of cyber crime continues to rise

The costs that organizations incur as a result of cyber crime has gone up, and so has the time it takes to resolve those attacks, according to a …

How to See your Passwords Hidden Under Asterisks

Say you are on the Gmail login page and the web browser, as always, has auto-filled the username and passwords fields for you.<p>This is convenient …

Software

Bitmessage Wiki

Previous Version (Beta)<p><b>0.6.1</b> <br>Aug 21, 2016<br>Changelog<p>Bitmessage<p>A remote code execution vulnerability has been spotted in use against some users running …

BIND Vulnerablilty Enables DNS Cache Poisoning Attack

A vulnerability in the BIND domain name system (DNS) software could give an attacker the ability to easily and reliably control queried name servers …

Warning: Android Bitcoin wallet apps vulnerable to theft

A critical vulnerability in the Android implementation of the <i>Java SecureRandom random number generator</i> was discovered, that leaves Bitcoin digital …

Faulty Microsoft Exchange Server 2013 Patch Pulled Back

Microsoft announced Wednesday afternoon that it has pulled MS13-061, one of the patches issued yesterday for vulnerabilities in Exchange Server …

Once the province of Windows XP, Web servers are hackers’ target of choice | Ars Technica

Apache and Joomla exploits are only the latest examples of the growing bullseye.<p>In a pattern that has played out repeatedly over the past year or …

Fake Flash Player Update Causes Mayhem In Your Browser

<b>UPDATE (08/22/13)</b>: Apple revoked the fake Flash Player’s certificate which effectively removes it from Safari.<p><b>UPDATE (08/21/13)</b>: The bad guys are …

Cracking Cryptography and Encryption Exponentially Easier

It’s been a brutal month for crypto.<p>Starting with the Black Hat conference, researchers, engineers and hackers have been unveiling new weaknesses and …