Latest Articles

[img_assist|nid=6017|title=|desc=|link=none|align=left|width=100|height=100]Roughly 10,000 computer hacking enthusiasts, poseurs, geeks, nerds and government agents gathered for DefCon this weekend. In its 18th year, the world’s largest hacker convention draws people from all walks of life to learn about the latest hacking techniques. Read the full article. [Wired]

Read more...

Categories: Cryptography, Government

[img_assist|nid=6016|title=|desc=|link=none|align=right|width=100|height=100]Two students from the Massachusetts Institute of Technology (MIT) may have helped WikiLeaks suspect Bradley Manning spirit classified information out of military databases, according to a CNN report. Read the full article. [Computerworld]

Read more...

Categories: Malware, Vulnerabilities

[img_assist|nid=6009|title=|desc=|link=none|align=left|width=100|height=100]As mobile devices such as iPhones, BlackBerrys, Android phones and others have become more sophisticated and easy to use, many users have made them their main computing and Web-browsing devices. And that evolution naturally has caught the attention of attackers who have begun tailoring more and more of their attacks at these mobile platforms.

Read more...

[img_assist|nid=6004|title=|desc=|link=none|align=right|width=100|height=100]A Web site set up to help iPhone users jailbreak their devices is using a flaw in the way that the iPhone handles PDF files to escape the phone’s sandbox security function and enable users to load applications that aren’t in Apple’s official App Store. The same flaw could easily be used to install malicious software in drive-by download attacks, experts say.

Read more...

[img_assist|nid=5995|title=|desc=|link=none|align=left|width=100|height=100]According to a newly published report, upon obtaining access to a mini ZeuS botnet dubbed Mumba, researchers at AVG found 60GB of stolen data such as, accounting details for social networking sites, banking accounts, credit card numbers and intercepted emails. Read the full article. [ZDNet]

Read more...

[img_assist|nid=5991|title=|desc=|link=none|align=right|width=100|height=100]A hardware hacking expert here at Defcon18
successfully faked several attendees’ cell phones into connecting to his
phony GSM base station during a live demonstration that had initially
raised concerns at the Federal Communications Commission (FCC). Read the full article. [Dark Reading]

Read more...

[img_assist|nid=5990|title=|desc=|link=none|align=left|width=100|height=100]IT security researchers Nicholas Percoco and Christian Papathanasiou demonstrated what they claim is the first rootkit for Android. Their aim was to show how slight the obstacles to the development of a such a rootkit are and how powerful the result can be. Read the full article. [The H Security]

Read more...

Categories: Web Security

By Dennis Fisher[img_assist|nid=3102|title=|desc=|link=none|align=left|width=100|height=100]In the year and a half since we first launched Threatpost, the site has grown very quickly, probably more quickly than any of us had even hoped it might. We’ve added a couple of regular podcasts, original videos, developed a stable of terrific regular contributors and recently launched our first on-demand video event. And now we’re making a major addition to our editorial staff.

Read more...