Latest Articles

[img_assist|nid=2979|title=|desc=|link=none|align=left|width=100|height=100]A vast majority of voice encryption products are seriously flawed, according to controversial tests by an anonymous hacker.

Using the commercially available FlexiSpy wiretapping utility and a
‘homemade’ Trojan, Notrax (the anonymous hacker’s nickname) claims to
have defeated 11 out of 15 voice encryption technologies in tests. Read the full article. [The Register]

Read more...

Categories: Web Security

[img_assist|nid=2971|title=|desc=|link=none|align=right|width=100|height=100]Google is starting a new program that will pay security researchers a $500 bounty for every security bug they find in Chromium, the open-source codebase behind the Google Chrome browser, as well as for bugs found in Chrome itself.

Read more...

Categories: Malware, Web Security

By Gunter Ollmann, Damballa[img_assist|nid=2970|title=|desc=|link=none|align=left|width=100|height=100]The recent Google Advanced Persistent Threat (APT) dialogue has been
hogging the press for a week now, and each day reveals new (and often
conflicting) insight. As I mentioned on Thursdays blog – “Preemptive Protection” Isn’t – If You’re Battling APT’s
– this particular attack doesn’t represent some new shift in tactics.
It’s not the first APT in the world, in fact I’m pretty sure it’s not
Google’s first exposure to APT’s, and I’m certain it isn’t going to the
last. In fact I’d say its a safe bet to say that there are several
other equivalent APT successes currently operating within Google’s
networks waiting to be discovered. Such is the state of the threat.

Read more...

[img_assist|nid=2948|title=|desc=|link=none|align=right|width=100|height=100]A study — which was created using the unlikely combination of identity fraud incidence statistics with basic
consumer demographics — indicates that identity thieves are
successfully targeting the wealthy and affluent, regardless of the
systems and software they use. Read the full article. [Dark Reading]

Read more...