[img_assist|nid=6017|title=|desc=|link=none|align=left|width=100|height=100]Roughly 10,000 computer hacking enthusiasts, poseurs, geeks, nerds and government agents gathered for DefCon this weekend. In its 18th year, the world’s largest hacker convention draws people from all walks of life to learn about the latest hacking techniques. Read the full article. [Wired]
[img_assist|nid=6016|title=|desc=|link=none|align=right|width=100|height=100]Two students from the Massachusetts Institute of Technology (MIT) may have helped WikiLeaks suspect Bradley Manning spirit classified information out of military databases, according to a CNN report. Read the full article. [Computerworld]
[img_assist|nid=6009|title=|desc=|link=none|align=left|width=100|height=100]As mobile devices such as iPhones, BlackBerrys, Android phones and others have become more sophisticated and easy to use, many users have made them their main computing and Web-browsing devices. And that evolution naturally has caught the attention of attackers who have begun tailoring more and more of their attacks at these mobile platforms.
[img_assist|nid=6004|title=|desc=|link=none|align=right|width=100|height=100]A Web site set up to help iPhone users jailbreak their devices is using a flaw in the way that the iPhone handles PDF files to escape the phone’s sandbox security function and enable users to load applications that aren’t in Apple’s official App Store. The same flaw could easily be used to install malicious software in drive-by download attacks, experts say.
[img_assist|nid=5984|title=|desc=|link=none|align=left|width=100|height=100]Microsoft has rushed out and emergency patch for all supported versions of Windows to cover a gaping — and under attack — security flaw in the way shortcuts are displayed by the operating system.
[img_assist|nid=5995|title=|desc=|link=none|align=left|width=100|height=100]According to a newly published report, upon obtaining access to a mini ZeuS botnet dubbed Mumba, researchers at AVG found 60GB of stolen data such as, accounting details for social networking sites, banking accounts, credit card numbers and intercepted emails. Read the full article. [ZDNet]
[img_assist|nid=5991|title=|desc=|link=none|align=right|width=100|height=100]A hardware hacking expert here at Defcon18
successfully faked several attendees’ cell phones into connecting to his
phony GSM base station during a live demonstration that had initially
raised concerns at the Federal Communications Commission (FCC). Read the full article. [Dark Reading]
[img_assist|nid=5990|title=|desc=|link=none|align=left|width=100|height=100]IT security researchers Nicholas Percoco and Christian Papathanasiou demonstrated what they claim is the first rootkit for Android. Their aim was to show how slight the obstacles to the development of a such a rootkit are and how powerful the result can be. Read the full article. [The H Security]
By Dennis Fisher[img_assist|nid=3102|title=|desc=|link=none|align=left|width=100|height=100]In the year and a half since we first launched Threatpost, the site has grown very quickly, probably more quickly than any of us had even hoped it might. We’ve added a couple of regular podcasts, original videos, developed a stable of terrific regular contributors and recently launched our first on-demand video event. And now we’re making a major addition to our editorial staff.