Security » News »

  • SHA-1 collision can break SVN code repositories

    The recently announced SHA-1 collision attack has the potential to break code repositories that use the Subversion (SVN) revision control system.

    28 Feb. 17 05:23 Written by Lucian Constantin
  • Cog Systems offers more secure version of HTC A9 smartphone

    It sounds like a smartphone user's worst fear: Software that starts up before the phone's operating system, intercepting and encrypting every byte sent to or from the flash memory or the network interface.

    This is not some new kind of ransomware, though, this is the D4 Secure Platform from Cog Systems.

    28 Feb. 17 04:00 Written by Peter Sayer
  • Replace SHA-1. It’s not that hard.

    Now that SHA-1 has been broken it’s time for enterprises that have ignored its potential weakness for years to finally act, and it’s not that hard.

    25 Feb. 17 05:03 Written by Tim Greene
  • Stop using SHA1: It’s now completely unsafe

    Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature.

    24 Feb. 17 09:35 Written by Lucian Constantin
  • Eleven-year-old root flaw found and patched in the Linux kernel

    Linux system administrators should watch for kernel updates for their distributions and apply them as soon as possible because they fix a local privilege escalation flaw that could lead to a full system compromise.

    24 Feb. 17 02:11 Written by Lucian Constantin
  • Amid cyberattacks, ISPs try to clean up the internet

    If your computer’s been hacked, Dale Drew might actually know about it. His company, Level 3 Communications, is a major internet backbone provider and routinely on the lookout for cyberattacks on the network level. From what they can tell, there’s a staggering 178 million IP addresses out there associated with malicious activity.

    24 Feb. 17 00:30 Written by Michael Kan
  • New macOS ransomware spotted in the wild

    A new file-encrypting ransomware program for macOS is being distributed through bittorrent websites and users who fall victim to it won't be able to recover their files, even if they pay.

    23 Feb. 17 05:58 Written by Lucian Constantin
  • Cisco touts next-gen firewall gear for midsize installations

    Cisco is coming out with four next generation firewall boxes aimed at giving smaller organizations protection that is better sized to their needs and engineered to minimize performance hits as additional security services are turned on.

    23 Feb. 17 04:54 Written by Tim Greene
  • Hackers behind bank attack campaign use Russian as decoy

    The hackers behind a sophisticated attack campaign that has targeted financial organizations around the world have intentionally inserted Russian words and commands into their malware in an attempt to throw investigators off.

    21 Feb. 17 02:00 Written by Lucian Constantin

Market Place