Please turn on your JavaScript for this page to function normally.
Multiple Java versions on endpoints risky for enterprises

Java represents a significant security risk to enterprises because it is the endpoint technology most targeted by cyber attacks, show the results of Bit9 research. The …

Apple developer center hacked by security researcher?

The mystery of why Apple’s Developer Center has been inaccessible for users since last Thursday has apparently been solved, as UK-based security researcher Ibrahim Balic …

Apps exploiting Android “Master Key” bug offered on Google Play

Researchers from security firm Bitdefender have unearthed two relatively popular apps on Google Play that leverage the infamous Android “Master Key” bug, but …

Vendors patch security vulnerabilities within 3 weeks

High-Tech Bridge Security Research Lab released its statistics on web application security for the first half of 2013. The statistics is based on HTB Security Advisories that …

McAfee ePolicy Orchestrator exploitation tool

US-CERT’s latest advisory focuses on an exploit tool for McAfee ePolicy Orchestrator. The tool targets two vulnerabilities found in ePO versions 4.6.5 and earlier. In …

Bug bounties are cheaper than hiring full-time bug hunters

Software companies that have instituted bug bounties are on the right track, a recently published report by researchers of the University of California, Berkeley computer …

Bluebox releases free scanner for Android “master key” bug

Bluebox Security, the mobile security startup that’s “working to save the world from information thievery”, has made a name for itself by finding and …

Microsoft gives app developers 180 days to fix bugs

This month’s Patch Tuesday has been a prolific one, and patches for a total of 34 vulnerabilities – six of which critical – have been made available for …

POC code for critical Android bug published

Last week, researchers from Bluebox Security have made a disconcerting revelation: Google’s Android mobile OS carries a critical bug that allows attackers to modify the …

US Emergency Alerting System vulnerable to attack

IOActive has discovered vulnerabilities in the Emergency Alerting System (EAS) which is widely used by TV and radio stations across the United States. They uncovered the …

The magnitude of Android’s “master key” bug

The Android flaw whose existence was revealed last week by Bluebox Security is as bad as they come. “Blowing hash and signing functions so that the underlying code can …

Android bug allows app code change without breaking signatures

Researchers from Bluebox Security have discovered a critical Android flaw that allows attackers to modify the code of any app without breaking its cryptographic signature, and …

Don't miss

Cybersecurity news