Researchers find backdoor bug in NASA rovers’ real-time OS
A critical, remotely exploitable vulnerability in VxWorks, the world’s most popular real-time operating system (RTOS), can be exploited by attackers to gain backdoor …
Will the 2016 US presidential campaign get hacked?
As the 2016 presidential race heats up, Wakefield Research examined American perceptions of the threat of political hacking, and which of the leading U.S. presidential …
137 major incidents disrupted EU telephony and Internet access in 2014
ENISA publishes its Annual Incidents report which gives the aggregated analysis of the security incidents causing severe outages in 2014.The report provides an overview on an …
Intel establishes automotive security review board
To mitigate cyber-security risks associated with connected automobiles while encouraging technological progression and innovation, Intel established the Automotive Security …
Week in review: Android ransomware multiplies, FireEye censors researcher
Here’s an overview of some of last week’s most interesting news and articles:Hacker had access to sensitive info about Firefox bugs for over a yearMozilla has …
New malware can make ATMs not give users’ card back
“A new type of malware that can be used to compromise ATMs independently of who their manufacturer is, and can make the machine steal card data but also the cards …
Apple complicates app sideloading in iOS 9 for increased security
Making things easier for users is generally a good idea, but sometimes complicating a process could lead to increased security, and should be the preferred option.A blog post …
FireEye legally censors crucial parts of a researcher’s talk at 44CON
Felix Wilhelm, a researcher with German security firm ERNW, was scheduled to give a talk at 44CON on Thursday about the critical vulnerabilities he and his colleagues found in …
Do conventional security measures negatively impact productivity?
91 percent of business respondents reported that their productivity is negatively impacted by security measures their employer has put in place, according to Dell. However, if …
63% in favor of encryption backdoors to respond to national security threats
Vormetric did a survey on how Americans view “backdoor” access by government entities to the encrypted data of private businesses. Ninety-one percent recognized …
Vulnerability management embraces new functions
Vulnerability management (VM) solution providers have always held their own in the global network security domain. VM technologies scan network endpoints such as desktops and …
US Energy Department’s systems breached 159 times in four years
The US Department of Energy (DOE) has had its computer systems successfully breached by cyber attackers 159 times in four years, USA Today reports.The US DOE is responsible, …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise