Security

Uber links to sensitive ride data now expire after 48 hours

Uber has tweaked one of the features in its app after it was shown to let sensitive trip data become publicly accessible through Google.

By Zach Miners | 04 September, 2015 21:54

Tags: Uber

NIST sets the stage for contactless fingerprint readers

While many are hoping that biometric technologies such as fingerprint readers will one day replace cumbersome passwords, the U.S. National Institute of Technology is looking even further out.

Blackberry buys Good Technology as it further expands into mobile device security

Blackberry placed rivalries aside and purchased Good Technology as the phone maker moves further into the mobile security market.

French ISPs petition court to overturn secret foreign surveillance decree

Two French ISPs have asked France's highest court to overturn a secret government decree defining how French security services can scoop up foreign Internet traffic. They claim the decree is unconstitutional.

By Peter Sayer | 04 September, 2015 18:11

Tags: surveillance

LinkedIn-based intelligence gathering campaign targets the security industry

A LinkedIn-based intelligence gathering campaign has been using fake LinkedIn profiles to map out the professional networks of IT security experts.

Even encrypted medical record databases leak information

A new study from Microsoft researchers warns that many types of databases used for electronic medical records are vulnerable to leaking information despite the use of encryption.

Uber ride data publicly accessible through Google

On Thursday, a site-specific search on Google for trip.uber.com produced dozens of links to Uber rides that have been completed and cancelled, in countries around the world including the U.S., England, Russia, France and Mexico.

By Zach Miners | 03 September, 2015 23:39

Tags: Uber

Cisco security chief: 4 things CISOs need to survive

Cisco’s security consulting chief James Mobley outlines four areas CISOs need to develop their skills in order to keep up with the rapidly changing needs of corporate security.

By Tim Greene | 03 September, 2015 18:33

Tags: cisco

Shopperz adware takes local DNS hijacking to the next level

The Shopperz adware program uses a cunning technique to make DNS (Domain Name System) hijacking harder to detect and fix.

Despite reports of hacking, baby monitors remain woefully insecure

A security analysis of nine baby monitors from different manufacturers revealed serious vulnerabilities and design flaws that could allow hackers to hijack their video feeds or take full control of the devices.

Check Point’s SandBlast sandbox spells R.I.P for ROP attacks

Check Point is upgrading its sandboxing technology so it catches attacks earlier in the process and makes it harder for adversaries to evade detection.

By Tim Greene | 02 September, 2015 17:02

Tags: check point

Employees put business data at risk by installing gambling apps on their phones

The average company has more than one gambling application installed on some of its employees' mobile devices, and in some cases as many as 35.

HP beefs up enterprise security suite with tools to root out malware, app vulnerabilites

Hewlett-Packard has added machine learning analysis capabilities to its Fortify application testing service, and introduced a new service for checking DNS requests for malware attacks.

NT cops use facial recognition to fight crime

The Northern Territory Police Force is using facial recognition technology to identify criminals through a database of photos and match them against any image or CCTV footage.

By Hamish Barwick | 02 September, 2015 09:37

Tags: Northern Territory Police, NEC

Popular Belkin Wi-Fi routers plagued by unpatched security flaws

The Belkin N600 DB wireless dual band router model has unpatched vulnerabilities that could allow hackers to compromise affected devices.

Intel says GPU malware is no reason to panic, yet

Malware that runs inside GPUs (graphics processing units) can be harder to detect, but is not completely invisible to security products.

Former Secret Service agent admits $820K Silk Road theft

A former Secret Service agent admitted Monday to stealing $820,000 worth of bitcoins from Silk Road vendors during the investigation of the online contraband market.

Tired of memorizing passwords? A Turing Award winner came up with this algorithmic trick

Passwords are a bane of life on the Internet today, but one Turing Award winner has an algorithmic approach he thinks could make them not only easier to manage but also more secure.

Russia, China said to use hacked databases to find US spies

Russian and Chinese cyberspying units are reportedly cross-checking hacked databases to identify U.S. intelligence operatives.

Attivo brings deception technology to Amazon Web Services

Attivo Networks has upgraded its deception technology so businesses can deploy it within Amazon Web Services cloud to lure attackers to what looks like legitimate physical and virtual machines in order to find out what they are up to.

By Tim Greene | 31 August, 2015 22:03

Tags: amazon.com

Top Whitepapers

Featured Whitepapers