Serious flaws in cell phone carrier control software found
At the Black Hat conference this week, two Accuvant researchers have disclosed serious security flaws in the carrier control software used in over 2 billion cellular devices …
End-to-end encryption hardware for unsecure networks
x.o.ware has debuted the ExoNetTM VPEx Gateway and its companion product, the ExoKey Secure Communications Extension, this week at Black Hat USA 2014. These two new products, …
Mocana offers an alternative to OpenSSL on Apache web servers
At the Black Hat USA 2014 conference, Mocana debuted its enterprise-grade NorthStar secure connectivity solution for Apache web servers, a highly secure, drop-in replacement …
Unified solution for dynamic mitigation of cyberattacks
At Black Hat USA 2014, ForeScout Technologies, provider of pervasive network security solutions for Global 2000 enterprises and government organizations, and ThreatStream, a …
Five steps to take to protect your passwords
A report issued this week claimed that a Russian cybercrime group stole 1.2 billion usernames and passwords from 420,000 websites. While some security experts question the …
Gemalto to acquire SafeNet
Gemalto has signed a definitive agreement to acquire 100% of the share capital of SafeNet, a worldwide leader in data protection and software monetization, from Vector Capital …
Yahoo will offer end-to-end mail encryption by 2015
Since the beginning of this year, Yahoo has had several good news for its customers: Yahoo Mail got HTTPS on by default, and the company began encrypting all the traffic …
Critical bug in WordPress plugin allows site hijacking
A popular WordPress plugin that allows site owners to easily customize the contact form has a critical vulnerability that can be exploited to download and remotely modify the …
Oracle introduces vault for encryption keys, wallet files
Encryption is widely recognized as the gold standard for protecting data privacy, but encryption is only as strong as its key management. Critical credential files such as …
Photo gallery: A walk through Black Hat’s Business Hall
This gallery from Black Hat features: Qualys, Blue Coat Systems, FireEye, Shape Security, Michael Schrenk, Gigamon, Securonix, ThreatTrack Security.
Free Android app identifies and uninstalls spyware
At Black Hat, SnoopWall announced the release of Privacy App for Android platform mobile devices. Privacy App is based upon the company’s counterveillance technology. It …
Two Gameover Zeus variants targeting Europe and beyond
Bitdefender has identified two Gameover Zeus variants in the wild: one of them generates 1,000 domains per day and the other generates 10,000 per day. The UK is currently the …
Featured news
Resources
Don't miss
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps
- MDEAutomator: Open-source endpoint management, incident response in MDE