Monday, April 27, 2015
           (757) 873-6707                     Monday - Friday, 9 am - 5:30pm
Active Defense Can Give Pause to Threats Enterprises can use existing networking tools to put up internal barriers against hackers in order to frustrate them on to other targets.
Bypassing OS X Security Tools is Trivial, Researcher Says SAN FRANCISCO–For years, Apple has enjoyed a pretty good reputation among users for the security of its products. That halo has been enhanced by the addition of new security features such as Gatekeeper and XProtect to OS X recently, but one researcher said that all of those protections are simple to bypass and gaining persistence […]
iOS Vulnerability Could Force Devices Into Endless Reboot Loop Researchers stumbled upon a vulnerability recently that can force any iPhone or iPad into a perpetual reboot loop.
Privacy Goal: More Controls in Users’ Hands The chief privacy officers of Microsoft, Facebook and Google today at RSA Conference discussed how their respective companies want to put more privacy controls in users' hands.

Latest News

New Utility Decrypts Data Lost to TeslaCrypt Ransomware

Cisco published an analysis of TeslaCrypt and a decryptor tool that recovers files lost to the ransomware.

Details on WordPress Zero Day Disclosed

A Finnish researcher has disclosed details on an unpatched stored cross-site scripting vulnerability in the WordPress core engine.

Second Crypto Bug in Networking Library Could Affect 25,000 Apps

A few weeks after the developers of the AFNetworking library that’s popular among iOS and OS X app developers patched a serious bug in the library that enabled man-in-the-middle attacks, another, similar flaw has surfaced. The new vulnerability is related to how the AFNetworking library handles domain name validation for certificates. As it turns out, the library […]

Siemens Patches Ghost Flaw Simatic Product

Siemens has released an update for some of its ICS products that are affected but the glibc Ghost vulnerability that was disclosed in January. The vulnerability affected both the Siemens Sinumerik and Simatic HMI Basic applications, which are used in a variety of industrial situations. “The affected products, SINUMERIK, SIMATIC HMI Basic, and Ruggedcom, are used as an […]

Google Provides Detailed Analysis of GitHub Attack Traffic

The high-profile DDoS attack against GitHub that went on for several days last month was the end result of an operation that included several phases and extensive testing and optimization by the attackers. Researchers at Google analyzed the attack traffic over several weeks and found that the attackers used both Javascript replacement and HTML injections. […]

Podcast: News From RSA 2015

Dennis Fisher, Mike Mimoso and Brian Donohue discuss the news of the week from the RSA Conference.

The Real ‘Next Generation’ of Security Revealed at RSA

During his RSA keynote today, Juniper Networks' Chris Hoff shared the stage with 9-year-old hacker Reuben Paul, in a talk meant to be a call to action for the security industry to teach young programmers security and privacy from the outset.

Microsoft Launches Project Spartan Bounty

Microsoft announced a two-month bug bounty for its new Project Spartan browser.

‘Fully Secure Systems Don’t Exist’

SAN FRANCISCO–The more things change, the more they stay the same. Thirty years ago, Adi Shamir, one of the inventors of the RSA algorithm, was asked to do a keynote speech at a conference and spoke about his laws of computer security. They were a set of principles that he developed over the years relating […]

Renewed Attention on Android Apps Failing SSL Validation

CERT researcher Will Dormann presented an update on his research looking at Android apps that fail to validate SSL; Google meanwhile, says it will get stricter with enforcement.