Techworld

Stories by Jeremy Kirk

Google+

Microsoft security tool EMET 5.0 puts a leash on plugins

The latest release of a Microsoft security tool that's designed to stop exploits lets administrators control when third-party plugins are launched, a long favored route for attackers.

By Jeremy Kirk | 01 August, 2014 12:21

Tags: security, Microsoft, Exploits / vulnerabilities

No patch yet for zero day in Symantec Endpoint Protection software driver

A zero-day flaw in a software driver in Symantec's widely used Endpoint Protection product may be tricky to fix.

By Jeremy Kirk | 31 July, 2014 12:33

Tags: symantec, security, Offensive Security, Exploits / vulnerabilities

iPhone gets first free app for encrypting voice calls

An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.

By Jeremy Kirk | 30 July, 2014 14:39

Tags: applications, telecommunication, security, ios, Mobile OSes, encryption, Open Whisper Systems, mobile

Zero-day flaws found in Symantec's Endpoint Protection

Symantec's Endpoint Protection product has three zero-day flaws that could allow a logged-in user to move to a higher access level on a computer, according to a penetration testing and training company.

By Jeremy Kirk | 30 July, 2014 13:32

Tags: symantec, security, Offensive Security, Exploits / vulnerabilities

Using Instagram on public Wi-Fi poses risk of an account hijack, researcher says

A configuration problem in Facebook's popular Instagram application for Apple devices could allow a hacker to hijack a person's account if they're both on the same public Wi-Fi network.

By Jeremy Kirk | 29 July, 2014 15:47

Tags: Internet-based applications and services, Instagram, security, internet, Exploits / vulnerabilities, Facebook

Until the Tails privacy tool is patched, here's how to stay safe

Vulnerabilities in the Tails operating system could reveal your IP address, but you can avoid trouble by taking a couple of precautions.

By Jeremy Kirk | 28 July, 2014 11:24

Tags: Exodus Intelligence, Tails, security, Exploits / vulnerabilities

New guide aims to remove the drama of reporting software flaws

Handling a software flaw can be messy, both for a security researcher who found it and for the company it affects. But a new set of guidelines aims to make that interaction less mysterious and confrontational.

By Jeremy Kirk | 25 July, 2014 15:36

Tags: CipherLaw, security, Bugcrowd

'Canvas fingerprinting' tracking is sneaky but easy to halt

A method for tracking users across the Internet called "canvas fingerprinting" is simple to stop, but average Internet users may not know how to do it.

By Jeremy Kirk | 25 July, 2014 12:18

Tags: advertising, analytics, AddThis, internet, AdBlock Plus, Abine

Firm says vulnerability in Tails contained in I2P component

A vulnerability broker published a video demonstrating one of several flaws it has found in the privacy-focused Tails operating system, which is used by those seeking to make their Web browser harder to trace.

By Jeremy Kirk | 24 July, 2014 10:30

Tags: Exodus Intelligence, Tails, security, Exploits / vulnerabilities

SQL injection flaw in Wall Street Journal database led to breach

A vulnerability in a web-based graphics system led to a breach of The Wall Street Journal's network by a hacker, the newspaper acknowledged late Tuesday.

By Jeremy Kirk | 23 July, 2014 20:34

Tags: dow jones, IntelCrawler, security, data breach, data protection, Exploits / vulnerabilities

Zero-day flaws in Tails aren't for sale, vulnerability broker says

A company that specializes in selling information on software vulnerabilities has reignited a debate over the handling of such information, especially when it pertains to privacy-focused tools.

By Jeremy Kirk | 23 July, 2014 12:27

Tags: Exodus Intelligence, security

Virtru launches business email encryption service for Google Apps

Email encryption startup Virtru has launched a version of its service for businesses using Google Apps, a market segment that the company thinks is showing increased interest in secure communications.

By Jeremy Kirk | 22 July, 2014 21:34

Tags: applications, security, e-mail, encryption, software, Virtru

Goodwill Industries investigates suspected payment card breach

Goodwill Industries International said on Monday that federal authorities are investigating a possible payment card breach at its US-based retail outlets.

By Jeremy Kirk | 22 July, 2014 13:43

Tags: security, data breach, Goodwill Industries

Black Hat presentation on TOR suddenly cancelled

A presentation on a low-budget method to unmask users of a popular online privacy tool, TOR, will no longer go ahead at the Black Hat security conference early next month.

By Jeremy Kirk | 22 July, 2014 12:59

Tags: The TOR Project, Carnegie Mellon University, security

Stealthy Web tracking tools pose increasing privacy risks to users

Three stealthy tracking mechanisms designed to avoid weaknesses in browser cookies pose potential privacy risks to Internet users, a new research paper has concluded.

By Jeremy Kirk | 22 July, 2014 11:27

Tags: advertising, analytics, Internet-based applications and services, security, data protection, internet, AddThis.com

Twitter Feed

Featured Whitepapers