| Tuesday July 29th 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

Posts Tagged ‘security researchers’

Comparative analysis of leaked Sony and Gawker passwords

Comparative analysis of leaked Sony and Gawker passwords

While it's pretty awful that a million Sony users' passwords and 0.25 million Gawker passwords were published online, it has made for an interesting comparative analysis of the weaknesses in password protection, a subject near and dear to many security researchers' hearts. Troy Hunt has published one such analysis, and it's a fascinating [...]

PlayStation Network: hackers claim to have 2.2m credit cards

PlayStation Network: hackers claim to have 2.2m credit cards

COINCIDENCE? Come on Guardian. Don't lend credit to Sony's story that "Some credit card information may have possibly kind of been a little bit stolen/borrowed." Hackers in underground online forums are claiming to have access to credit card details stolen from Sony's PlayStation Network in mid-April, though security researchers say it is not [...]

iOS devices secretly log and retain record of every place you go, transfer to your PC and subsequent devices

iOS devices secretly log and retain record of every place you go, transfer to your PC and subsequent devices

Security researchers presenting at the Where 2.0 conference have revealed a hidden, secret iOS file that keeps a record of everywhere you've been. The record is synched to your PC and subsequently resynched to your other mobile devices. The file is not transmitted to Apple, but constitutes a substantial privacy breach if your PC or mobile [...]

Evoting security researchers at U Michigan root DC’s voting machines with ease

Evoting security researchers at U Michigan root DC’s voting machines with ease

DC election officials put a test version of their voting system up in a mock primary and invited white hat attacks. U. Michigan broke it completely within 36 hours. DC officials reply, in a nutshell, "Well, that's why we asked people to test it." D.C. voting officials knew there might be openings in the upload procedure, said Paul Stenbjorn, [...]

Botmasters include fake control interface to ensnare security researchers

Botmasters include fake control interface to ensnare security researchers

Security researchers compromised what they believed to be a control server for the Zeus botnet, but after examining it in detail, they concluded that it was a fake, designed to allow botmasters to spy on security researcher tactics and plan countermeasures. What particularly stands out about the EFTPS exploit toolkit is their admin interface. [...]