Sunday, March 01, 2015
           (757) 873-6707                     Monday - Friday, 9 am - 5:30pm
Up to 18.8 Million Non-Anthem Customers Affected in Breach In addition to roughly 80 million Anthem customers, nearly 20 million more individuals who aren’t customers of the health insurer could ultimately wind up implicated in this month’s massive data breach.
DDoS Exploit Targets Open Source Rejetto HFS An automated attack targeting users of the open source Rejetto webserver and file-sharing application tried to inject the IptabLes DDoS tool.
Firefox 36 Arrives With Patches For Three Critical Flaws Mozilla has patched 16 security vulnerabilities in Firefox, including three critical flaws in the browser. One of the critical vulnerabilities patched with the release of Firefox 36 is a buffer overflow in the libstagefright library that can be exploitable under some circumstances. “Security researcher Pantrombka reported a buffer overflow in the libstagefright library during video […]
CloudFlare Deploys New Form of Encryption Across Sites CloudFlare has deployed a new level of encryption on its service that hardens and speeds up users' experience, especially when accessing domains via mobile browsers.

Latest News

Pharming Attack Targets Home Router DNS Settings

A pharming attack has been detected targeting home routers distributed from Brazil's largest telco, a rare instance of a web-based attack changing DNS settings in order to redirect traffic.

Threatpost News Wrap, February 27, 2015

Mike Mimoso and Dennis Fisher discuss the news of the last week, including the Superfish fiasco, the Gemalto SIM hack controversy and the continuing NSA drama.

Video: Vitaly Kamluk on The Equation Group APT

Kaspersky Lab researcher Vitaly Kamluk discusses the Equation Group, claiming it is the most sophisticated advanced persistent threat group in the world.

Twitter Changes Abuse Reporting Process to Address Doxing

Twitter has revised and simplified its rules and process for reporting abusive behavior on the service, and users now have the ability to report people who are posting their personal information. The change essentially gives Twitter users a method to combat doxing, which is the process of dumping a victim’s personal information online. This often […]

Komodia Certificate Manipulation Likely Led To Man-In-The-Middle Attacks

The EFF's Decentralized SSL Observatory turned up 1,600 certificates that should have been rejected but instead passed browser checks because they were manipulated by Komodia's SSL Digester interception module.

Ransomware Looming As Major Long-Term Threat

On May 30, 2014, law enforcement officials from the FBI and Europol seized a series of servers that were being used to help operate the GameOver Zeus botnet, an especially pernicious and troublesome piece of malware. The authorities also began an international manhunt for a Russian man they said was connected to operating the botnet, […]

Facebook Bug Bounty Submissions Climb in 2014

Facebook released final numbers on 2014 submissions and payouts from its bug bounty program, showing continued growth in both areas.

More than 1 Million WordPress Sites Open to SQL Injection Attacks

More than one million different WordPress sites may be vulnerable to a critical plugin issue that could lead to SQL injections and in turn, total site takeover.

Gemalto Officials Say SIM Infrastructure Not Compromised

Despite leaked documents from the NSA showing otherwise, officials at Gemalto on Wednesday said the company has found no evidence that its SIM card infrastructure was compromised several years ago by the NSA and GCHQ. The company identified a handful of what it called sophisticated attacks in the timeframe in questions, but said none of […]

Ramnit Botnet Shut Down

Europol and several private technology companies announced the overnight takedown of the command and control infrastructure supporting the Ramnit botnet.