Two more Comodo RAs compromised
The investigation Comodo has mounted following the recent compromise of one of its Registration Authorities and the issuing of rogue certificates for popular sites has …
Cisco ACS unauthorized password change vulnerability
A vulnerability exists in some Cisco Secure Access Control System (ACS) versions that could allow a remote, unauthenticated attacker to change the password of any user account …
NASA networks open to cyber attacks
Experts from the Office of the Inspector General (OIG) are not satisfied. Their audit of the computer networks on which NASA relies on to carry out its various missions has …
FBI asks public to break a code, help solve a murder
An interesting request for help has been made public yesterday by the FBI: “Cryptanalists, help solve an open murder case”. The murder happened back in 1999. …
ICSA Labs reveals electronic health record testing program
ICSA Labs unveiled a new certification program for electronic health record systems and has certified the first three products in two domains under the program. ICSA Labs …
Harvest geolocation user info with Creepy
Creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is …
The need for data encryption in the cloud
Recent Microsoft research shows that almost two-fifths of companies will start paying for cloud services within three years. Cloud-using firms need to revisit their encryption …
European Parliament computer network breached
The computer network of the European Parliament has been targeted by a cyber attack that may or may not be linked to the attack against the European Commission and the …
BP loses laptop with personal data of 13,000 claimants
A laptop containing personal information of some 13,000 people who filed claims for compensation after last year’s big oil spill in the Gulf of Mexico has been lost, …
Lifecycle model for managing unknown vulnerabilities
Codenomicon released its Unknown Vulnerability Management (UVM) Lifecycle model, a security assurance process, which focuses on unreported vulnerabilities. The UVM model helps …
Bank of America customer and staff accounts compromised
News that some Bank of America customers from the Greater Detroit area have discovered their accounts were pilfered after their debit cards were declined has raised the …
Siemens FactoryLink multiple vulnerabilities
Multiple vulnerabilities in Siemens FactoryLink can be exploited by malicious people to disclose potentially sensitive information, cause a Denial of Service, and compromise a …