Stories by Jeremy Kirk


Firm says vulnerability in Tails contained in I2P component

A vulnerability broker published a video demonstrating one of several flaws it has found in the privacy-focused Tails operating system, which is used by those seeking to make their Web browser harder to trace.

By Jeremy Kirk | 24 July, 2014 10:30

Tags: Exodus Intelligence, Tails, security, Exploits / vulnerabilities

SQL injection flaw in Wall Street Journal database led to breach

A vulnerability in a web-based graphics system led to a breach of The Wall Street Journal's network by a hacker, the newspaper acknowledged late Tuesday.

By Jeremy Kirk | 23 July, 2014 20:34

Tags: dow jones, IntelCrawler, security, data breach, data protection, Exploits / vulnerabilities

Zero-day flaws in Tails aren't for sale, vulnerability broker says

A company that specializes in selling information on software vulnerabilities has reignited a debate over the handling of such information, especially when it pertains to privacy-focused tools.

By Jeremy Kirk | 23 July, 2014 12:27

Tags: Exodus Intelligence, security

Virtru launches business email encryption service for Google Apps

Email encryption startup Virtru has launched a version of its service for businesses using Google Apps, a market segment that the company thinks is showing increased interest in secure communications.

By Jeremy Kirk | 22 July, 2014 21:34

Tags: applications, security, e-mail, encryption, software, Virtru

Goodwill Industries investigates suspected payment card breach

Goodwill Industries International said on Monday that federal authorities are investigating a possible payment card breach at its US-based retail outlets.

By Jeremy Kirk | 22 July, 2014 13:43

Tags: security, data breach, Goodwill Industries

Black Hat presentation on TOR suddenly cancelled

A presentation on a low-budget method to unmask users of a popular online privacy tool, TOR, will no longer go ahead at the Black Hat security conference early next month.

By Jeremy Kirk | 22 July, 2014 12:59

Tags: The TOR Project, Carnegie Mellon University, security

Stealthy Web tracking tools pose increasing privacy risks to users

Three stealthy tracking mechanisms designed to avoid weaknesses in browser cookies pose potential privacy risks to Internet users, a new research paper has concluded.

By Jeremy Kirk | 22 July, 2014 11:27

Tags: advertising, analytics, Internet-based applications and services, security, data protection, internet,

Aloha point-of-sale terminal, sold on eBay, yields security surprises

Matt Oh, a senior malware researcher with HP, recently bought a single Aloha point-of-sale terminal -- a brand of computerized cash register widely used in the hospitality industry -- on eBay for US$200.

By Jeremy Kirk | 18 July, 2014 14:15

Tags: ncr, HP, Viableware, security, data breach, malware

The 'Rickmote' shows no mercy when it finds someone using Chromecast

Google's online media streaming tool, Chromecast, can be "Rickrolled" with a single click of entertainer Rick Astley's mug shot.

By Jeremy Kirk | 17 July, 2014 13:14

Tags: Google, security, Bishop Fox

Mozilla's JPEG compression slims down file sizes

Mozilla has released an updated version of its JPEG compression tool that shaves down file sizes by 5 percent, a small figure but one that is significant for image-intensive Web services such as Facebook.

By Jeremy Kirk | 16 July, 2014 16:11

Tags: software, mozilla

EA dismisses claim its Origin software spies on users

Gamemaker Electronic Arts dismissed a rumor on Tuesday that its download client called Origin secretly collects data from users' computers.

By Jeremy Kirk | 15 July, 2014 16:54

Tags: security, electronic arts, privacy

Critical design flaw in Active Directory could allow for a password change

Microsoft's widely used software for brokering network access has a critical design flaw, an Israeli security firm said, but Microsoft contends the issue has been long-known and defenses are in place.

By Jeremy Kirk | 15 July, 2014 16:53

Tags: security, Microsoft, Access control and authentication, Aorato

LastPass discloses now-fixed vulnerabilities ahead of security conference

Popular password manager LastPass said it fixed two vulnerabilities that were found last year. The disclosure comes just ahead of a security conference where a research paper describing the problems is due to be presented.

By Jeremy Kirk | 14 July, 2014 12:34

Tags: LastPass, security, Exploits / vulnerabilities

Gmail users on iOS at risk of data interception

Apple users accessing Gmail on mobile devices could be at risk of having their data intercepted, a mobile security company said Thursday.

By Jeremy Kirk | 11 July, 2014 13:33

Tags: Google, applications, Lacoon Mobile Security, telecommunication, security, ios, Mobile OSes, mobile

Source code for tiny 'Tinba' banking malware leaked

The source code for an impressively small but capable malware program that targets online bank accounts has been leaked, according to CSIS Security Group of Denmark.

By Jeremy Kirk | 11 July, 2014 11:14

Tags: security, CSIS Security Group, malware

Top Whitepapers

Twitter Feed

Featured Whitepapers