Vulnerabilities in the secure Blackphone reported during DEF CON require unusual circumstances to exploit.
Browsing Category: Vulnerabilities
Absolute Software’s anti-theft Computrace software is mysteriously installed on brand new machines, nearly impossible to remove, and exploitable.
Embedded device security emerged as front page news during the recently wrapped up Black Hat and DEF CON events.
Microsoft announced that it will block older ActiveX controls in Internet Explorer, starting with Java.
LAS VEGAS – It’s widely known that embedded medical devices are hackable in dangerous ways, but the true risks to medical device are less well known.
Cambridge University researcher Ross Anderson urged experts to take heed of weaknesses in chip-and-PIN payment cards as the inevitable switchover looms in the U.S.
LAS VEGAS–Yahoo plans to enable end-to-end encryption for all of its Mail users next year. The company is working with Google on the project and the encryption will be mostly transparent for users, making it as simple as possible to use. Alex Stamos, CISO at Yahoo, said that the project has been a priority since[...]
Dennis Fisher talks with Wendy Nather of 451 Research about the happenings on day one of Black Hat, the possibility of the US government disrupting the vulnerability market and software liability. Download: Wendy-Nather-on-the-Black-Hat-Buzz.mp3
LAS VEGAS–David Litchfield for many years was one of the top bug hunters in the game and specialized in causing large-scale headaches for Oracle. When he decided to retire and go scuba diving, there likely were few tears shed in Redwood City. Litchfield recently decided to resurface, which is good news for the security community[...]
Researchers Charlie Miller and Chris Valasek today at Black Hat talked about their research on the remote attack surfaces present in popular automobiles.