Twitter patches vulnerability that could have impacted advertising accounts

Twitter's recently announced bug bounty program has helped the company identify and patch a serious vulnerability that could have potentially disrupted advertising on its platform.

By Lucian Constantin | 18 September, 2014 01:07

Tags: patches, online safety, security, High-Tech Bridge, twitter, Exploits / vulnerabilities

Adobe releases previously delayed security updates for Reader and Acrobat

After a one-week delay, Adobe Systems has released security updates for its Reader and Acrobat products to patch critical vulnerabilities that could lead to computers being compromised.

By Lucian Constantin | 17 September, 2014 21:33

Tags: patches, Adobe Systems, security, Desktop security, patch management, Exploits / vulnerabilities

The security function needs SMART metrics

I've become a big fan of metrics. I wasn't always, but throughout my career in information security, I've had bosses who have challenged me on metrics, and I have honed my skills so that now I feel the metrics I collect meet the "SMART" test: specific, meaningful, actionable, repeatable and time-dependent.

By By Mathias Thurman | 17 September, 2014 21:07

Tags: Gartner, metrics, security

Yelp settles US FTC charges of violating child privacy

Yelp has agreed to pay US$450,000 to the U.S. Federal Trade Commission to settle charges that the company accepted registrations to its services from children under 13 through its apps.

By John Ribeiro | 17 September, 2014 17:06

Tags: yelp, U.S. Federal Trade Commission, Internet-based applications and services, security, legal, internet, privacy

Copyright reform: eBay not sold on website blocking

Online auction behemoth eBay has rejected key measures proposed by the federal government to tackle online copyright infringement.

By Rohan Pearce | 17 September, 2014 16:22

Tags: copryright, ebay, piracy

Apple turns on iCloud two-step verification after nude selfie scandal

Apple on Tuesday began offering an additional security protection for iCloud account users, a move the company made following the theft of nude photos from several celebrities' accounts last month.

By Jeremy Kirk | 17 September, 2014 15:11

Tags: Apple, security, data breach, data protection

Committee backs new hacking powers for ASIO

An inquiry has recommended parliament passes national security legislation that would expand ASIO's ability to hack into third party computers in order to access target systems.

By Rohan Pearce | 17 September, 2014 14:23

Tags: civil liberties, surveillance, security, ASIO

Sweeping security law would have computer users surrender privacy

Parliament is about to consider a range of changes to Australia’s security laws introduced by the Abbott government during its last sitting.

By Keiran Hardy | 17 September, 2014 12:55

Tags: security, privacy

Children’s e-Safety Commissioner will have far-reaching online powers

The newly created Office of the Children’s e-Safety Commissioner will have the power to issue a notice to a cyberbully asking them to remove offending material from the Internet. If they do not comply, the Commissioner can refer the case to the police.

By Hamish Barwick | 17 September, 2014 12:18

Tags: cyber safety, Malcolm Turnbull, Department of Communications, cyberbullying, Children's e-Safety Commissioner

Hackers accessed Goodwill hosting provider for 18 months before card breach

Hackers evaded security systems for a year-and-a-half at a hosting center that processed payment cards for Goodwill Industries, using the same type of malware that struck Target and other major retailers to steal card data, according to the charity's software vendor.

By Jeremy Kirk | 17 September, 2014 10:23

Tags: security, C&K Systems, data breach, Goodwill Industries, malware

NSA reform bill stalled with Congress headed toward fall recess

The U.S. Congress is unlikely to pass legislation to end the National Security Agency's widespread collection of U.S. telephone records before leaving Washington, D.C., on a two-month break.

By Grant Gross | 17 September, 2014 06:29

Tags: U.S. National Security Agency, U.S. Foreign Intelligence Surveillance Court, Eric Holder, U.S. Office of the Director of National Intelligence, U.S. Congress, James Clapper, Barack Obama, legislation, Software and Information Industry Association, privacy, Ed Black, Harley Geiger, security, David LeDuc, Center for Democracy and Technology, government, Computer and Communications Industry Association, U.S. Department of Justice

Browser vulnerability caps rough few months for Android security

It has been a summer of discontent for the Android security community, as a host of vulnerabilities large and small has arisen to plague the world's most popular mobile OS. The revelation this week of a cross-site scripting flaw in the default browser installed on large numbers of pre-version 4.4 Android devices is merely the latest entry in a list that makes for unsettling reading.

By Jon Gold | 17 September, 2014 05:33

Tags: Silent Circle, Instagram, consumer electronics, blackphone, security, Android, smartphones, OKCupid

US court throws out $368.2 million patent award against Apple

A U.S. appeals court has thrown out a US$368.2 million award against Apple in a patent infringement case brought by patent-holding and software company VirnetX.

By Grant Gross | 17 September, 2014 05:17

Tags: U.S. District Court for the Eastern District of Texas, security, intellectual property, Kendall Larsen, legal, patent, Sharon Prost, VirnetX, U.S. Court of Appeals for the Federal Circuit, Apple

Micron ships 16nm node SSDs, cheapest price yet

Micron today announced a new SSD that uses its densest process to date and has a chip that can program the memory to act as high performance SLC or high-capacity MLC flash.

By Lucas Mearian | 16 September, 2014 23:22

Tags: Data storage, Components

Cisco gains strength in next-gen firewalls via Sourcefire code

Cisco is bringing technology obtained through last year's acquisition of Sourcefire to its firewalls to enable threat-focused security for enterprises.

By Jim Duffy | 16 September, 2014 23:22

Tags: firewalls, Cisco Systems, mergers & acquisitions, security, cisco

Many Android devices vulnerable to session hijacking through the default browser

The default browser in Android versions older than 4.4 has a vulnerability that allows malicious websites to bypass a critical security mechanism and take control of a user's authenticated sessions on other sites.

By Lucian Constantin | 16 September, 2014 22:43

Tags: Google, online safety, security, mobile security, Exploits / vulnerabilities

Apple Watch under scrutiny for privacy by Connecticut attorney general

The attorney general of the U.S. state of Connecticut is concerned about the privacy implications of Apple Watch's handling of consumers' health information.

By John Ribeiro | 16 September, 2014 15:16

Tags: Apple, consumer electronics, Attorney General of Connecticut, security, privacy

'Tiny banker' malware targets US financial institutions

A banking trojan, known for its small size but powerful capabilities, has expanded the number of financial institutions it can collect data from, according to security vendor Avast.

By Jeremy Kirk | 16 September, 2014 13:28

Tags: security, Avast, data protection, malware

Data loss detection tool mines the ephemeral world of 'pastes'

It's not easy to figure out if your data has been collected by hackers, but an online tool has been expanded to hunt through one of the most prolific sources of leaked data, known as "pastes."

By Jeremy Kirk | 16 September, 2014 12:05

Tags: Pastie, security, Slexy, Pastebin

Google registers dip in data requests from Australian police

Australian law enforcement requests for data about users of Google’s services dipped in the six months ending June 2014 compared to six months earlier, the search giant’s latest transparency report reveals.

By Rohan Pearce | 16 September, 2014 11:27

Tags: Google, privacy

Top Whitepapers

Twitter Feed

Featured Whitepapers