Now that CanSecWest and the Pwn2Own hacking contest has wrapped up for another year, we’re left to still ponder the security of web browsers, whether BIOS attacks are the next frontier, and how exploit brokers will shape the business end of vulnerability research.
Google on Monday released fixes for a number of bugs in Chrome discovered and exploited during Pwn2Own, releasing new versions of the browser for Windows, Mac and Linux.
In a letter sent to President Obama and members of Congress, former members and staff of the Church Committee on intelligence said that the revelations of the NSA activities have caused “a crisis of public confidence” and encouraged the formation of a new committee to undertake “significant and public reexamination of intelligence community practices”.
When it comes to the security of a critical infrastructure, it takes a mixed team with enough knowledge overall to make the right decisions, and to safely walk through a “SCADA Triangle”.
More than 7,600 different power, chemical and petrochemical plants may still be vulnerable to a handful of SCADA vulnerabilities made public this week.
Dennis Fisher and Mike Mimoso talk about the news from the CanSecWest conference, the drama and melodrama at Pwn2Own and the bad year that RNGs have had.
Mark Zuckerberg is mad as hell, and he’s not going to take it anymore. Actually, he is going to take it, because we all are going to take it, at least for the foreseeable future.
Keen Team, a group of Chinese hackers, took down Apple Safari and Adobe Flash at the annual Pwn2Own contest.
Browser exploits continue to make news at Pwn2Own, but one that failed stood out in particular.
The NSA on Thursday responded to media reports that it has been impersonating Facebook and other sites in order to compromise surveillance targets’ machines, saying that the agency “does not use its technical capabilities to impersonate U.S. company websites.”