Tuesday, July 29, 2014
           (757) 873-6707                     Monday - Friday, 9 am - 5:30pm
Bugcrowd Releases Open Source Vulnerability Disclosure Framework The problems that come from doing security research on modern Web applications and other software aren’t just challenging for researchers, but also for the companies on the receiving end of their advisories. Companies unaccustomed to dealing with researchers can find themselves in a difficult position, trying to figure out the clearest path forward. To help […]
WordPress Sites Seeing Increased Malware, Brute Force Attacks This Week A glut of Wordpress sites have fallen victim to both malware infections and a series of brute force attacks that have making the rounds over the past several days, researchers claim.
Researchers Demo TAILS Flaw Exploit, Disclose Details to Developers The critical vulnerability in the TAILS operating system discovered by researchers at Exodus Intelligence lies in the I2P software that's bundled with the OS and the company has released some details and a video demonstrating an exploit against the bug.
Privacy Badger Extension Blocks Tracking Through Social Icons Privacy Badger is one of a new generation of tools designed to help users block much of the silent, pervasive tracking that's done on the Web today, a lot of which is accomplished through social media channels.

Latest News

Missile Defense Plans Hacked from Israeli Contractors

A new report claims attackers, apparently based in China, were able to hack into three Israeli defense firms to make off with sensitive military data in 2011.

DEF CON Hosting SOHO Wireless Router Hacking Contest

ISE will host a two-tracking hacking contest at DEF CON next week that focuses on the security of home and small office wireless routers.

Harnessing the Power of an Android Cluster for Security Research

When the topicĀ of mobile security comes up, users and researchers often discuss Android as if it’s one monolithic operating system like iOS is. But the fact is that there are nearly as many versions of Android as there are Android devices, which has led to plenty of confusion when it’s time to fix a security […]

Koler Ransomware Infrastructure Complex and Agile

Researchers at Kaspersky Lab report on the infrastructure supporting the Koler ransomware, which not only has components targeting Android devices, but also redirects desktop browsers to other ransomware and exploit kits.

EFF Files Motion Asking Judge to Rule NSA Data Collection Unconstitutional

The EFF has asked a federal judge to rule that the NSA's collection of massive amounts of upstream user data is unconstitutional, violating the Fourth Amendment.

Siemens Patches Five Vulnerabilities in SIMATIC System

Siemens released an update for two builds of its SIMATIC automation system this week, addressing a quintet of issues, four of which are remotely exploitable.

Microsoft Exec Says Company Has Never Been Asked to Backdoor a Product

One of Microsoft's top security executives said the company has never been asked by the United States government to build a backdoor into any of its products, and if the company was asked, it would fight the order in the courts.

TAILS Team Recommends Workarounds for Flaw in I2P

The developers of the TAILS operating system say that users can mitigate the severity of the critical vulnerability researchers discovered in the I2P software that's bundled with TAILS with a couple of workarounds, but there is no patch for the bug yet.

More Details of Onion/Critroni Crypto Ransomware Emerge

New ransomware has been dubbed Onion by researchers at Kaspersky Lab as its creators use command and control servers hidden in the Tor Network (a/k/a The Onion Router) to obscure their malicious activity.

Mozilla Improves Malware Blocking in Firefox 31

The newest version of Mozilla Firefox includes an improved defense against malware downloaded through the browser, which could prevent many kinds of infections.