Stories by Lucian Constantin

Startup builds intrusion prevention system for home networks

At a time of growing concern about the security of interconnected devices in homes, a startup aims to provide consumers with a type of network security system traditionally used by businesses.

By Lucian Constantin | 18 August, 2014 02:42

Tags: Detection / prevention, networking hardware, intrusion, security, Networking, routers, Itus Networks

New Gameover Zeus botnet keeps growing, especially in the US

Cybercriminals are in the process of rebuilding the Gameover Zeus (GOZ) botnet, which law enforcement authorities took over in June, and recent research suggests that they've had some success, especially in the U.S.

By Lucian Constantin | 15 August, 2014 02:21

Tags: arbor networks, online safety, security, Malcovery Security, Desktop security, bitdefender, malware

BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software

BlackBerry's focus on strong security as a key differentiator for its devices does not mean that they're completely free of flaws. The company released security updates Tuesday for both the OS running on its smartphones and for its enterprise server software.

By Lucian Constantin | 14 August, 2014 03:14

Tags: Blackberry, patches, BlackBerry OS, security, Mobile OSes, mobile security, Exploits / vulnerabilities, mobile

Users should patch critical flaw in Adobe Reader and Acrobat, researchers say

Adobe Systems has released security patches for its Flash Player, Reader and Acrobat products, addressing a total of eight vulnerabilities, including one that is being exploited by attackers.

By Lucian Constantin | 13 August, 2014 23:20

Tags: patches, online safety, Adobe Systems, security, patch management, Exploits / vulnerabilities

Fifteen new vulnerabilities reported during router hacking contest

Routers appear to be as insecure as ever, after hackers successfully compromised five popular wireless models during a contest at the DefCon 22 security conference, reporting 15 new vulnerabilities to affected vendors.

By Lucian Constantin | 13 August, 2014 04:10

Tags: Tp-link Technologies, Actiontec Electronics, Linksys, online safety, TRENDnet, Networking, routers, belkin, Asustek Computer, Exploits / vulnerabilities, Electronic Frontier Foundation, networking hardware, security, netgear, D-Link, Verizon Communications, Independent Security Evaluators

Many home routers supplied by ISPs can be compromised en masse, researchers say

Specialized servers used by many ISPs to manage routers and other gateway devices provisioned to their customers are accessible from the Internet and can easily be taken over by attackers, researchers warn.

By Lucian Constantin | 10 August, 2014 23:33

Tags: networking hardware, Check Point Software Technologies, intrusion, online safety, security, Networking, routers, Exploits / vulnerabilities

Hacker coalition sets out to improve critical device security, challenges car makers

A collective of security researchers issued a letter Friday from the DefCon hacker conference in Las Vegas urging the automotive industry to adopt five principles for building safer computer systems in vehicles.

By Lucian Constantin | 10 August, 2014 03:11

Tags: security, Rapid7, Sonatype

Payment cards with chips aren't perfect, so encrypt everything, experts say

There's a push to adopt chip-equipped payment cards in the US following high-profile breaches at large retailers and restaurant chains during the past 12 months, but experts warn that switching to this payment system will not make fraud disappear.

By Lucian Constantin | 09 August, 2014 11:18

Tags: AccessData, security, data breach, data protection, fraud, Cambridge University

Some mobile POS devices still affected by critical flaws months after patch

Security researchers demonstrated Thursday flaws that can allow hackers to take over mobile point-of-sale (mPOS) devices from different manufacturers by inserting rogue cards into them.

By Lucian Constantin | 08 August, 2014 13:08

Tags: security, black hat, MWR InfoSecurity, data protection, fraud, malware

Carriers' remote control software continues to put some mobile devices at risk

Vulnerabilities found in remote management software that carriers insist be installed on smart phones and other mobile-enabled devices they sell are likely to put many devices at risk of compromise for some time to come.

By Lucian Constantin | 08 August, 2014 01:38

Tags: Red Bend Software, sprint, security, Mobile OSes, Accuvant, mobile security, Exploits / vulnerabilities, mobile

Network-attached storage devices more vulnerable than routers, researcher finds

A security review of network-attached storage (NAS) devices from multiple manufacturers revealed that they typically have more vulnerabilities than home routers, a class of devices known for poor security and vulnerable code.

By Lucian Constantin | 07 August, 2014 11:05

Tags: TRENDnet, Zyxel, Exploits / vulnerabilities, QNAP Systems, Buffalo Technology, Independent Security Evaluators, Seagate Technology, intrusion, security, Access control and authentication, netgear, western digital, data protection, D-Link, ASUSTOR

Stealthy malware 'Poweliks' resides only in system registry

A new malware program called Poweliks attempts to evade detection and analysis by running entirely from the system registry without creating files on disk, security researchers warn.

By Lucian Constantin | 05 August, 2014 01:47

Tags: security, trend micro, Desktop security, G Data Software, Exploits / vulnerabilities, antivirus, malware

Cisco patches traffic snooping flaw in operating systems used by its networking gear

Cisco Systems said attackers could disrupt or intercept traffic in many of its networking products unless a new security update is applied to the software they run.

By Lucian Constantin | 04 August, 2014 21:31

Tags: networking hardware, patches, Cisco Systems, security, Networking, patch management, Exploits / vulnerabilities

Android vulnerability still a threat to many devices nearly two years later

Security researchers have recently found a vulnerability that could be used to hijack Android apps and devices, but an older issue that can have the same effect remains a significant threat nearly two years after its discovery, according to security firm Bromium.

By Lucian Constantin | 02 August, 2014 02:54

Tags: Google, security, mobile security, Exploits / vulnerabilities, Bromium, malware

Attackers can easily create dangerous file-encrypting malware, new threat suggests

A new program that encrypts files to extort money from users highlights that attackers don't need advanced programming skills to create dangerous and effective ransomware threats, especially when strong encryption technology is freely available.

By Lucian Constantin | 01 August, 2014 22:21

Tags: symantec, security, Desktop security, encryption, malware

Twitter Feed

Featured Whitepapers