The critical vulnerability in the TAILS operating system discovered by researchers at Exodus Intelligence lies in the I2P software that’s bundled with the OS and the company has released some details and a video demonstrating an exploit against the bug.
Browsing Category: Uncategorized
A couple days after Microsoft warned users about a new vulnerability in Internet Explorer that’s being used in targeted attacks, Adobe on Monday said that researchers have discovered a zero day in Flash, as well, which attackers are using to target victims in Syria through a watering hole attack on a compromised Syrian government site.
Swedish VPN providers Mullvad report that private keys moving through OpenVPN installations are not immune to Heartbleed OpenSSL exploits.
On Thursday Google switched its Gmail service to HTTPS only, enforcing SSL encryption on all Gmail connections.
A quick research project done by a graduate student at Stanford on the security of hashed MAC addresses in retail analytics software has shown that time and the inevitable advancement of technology have are the greatest enemies of cryptography.
A new campaign, dubbed Operation SnowMan, was been spotted leveraging a previously unknown zero-day in Internet Explorer 10 after the U.S. Veterans of Foreign Wars’ website was compromised this week.
The ESEA League, an online competitive gaming community, has decided to settle with the state of New Jersey after the active Attorney General there alleged that the gaming community operator infected user-machines with malware designed to mine for Bitcoins.
Buried underneath the ever-growing pile of information about the mass surveillance methods of the NSA is a small but significant undercurrent of change that’s being driven by the anger and resentment of the large tech companies that the agency has used as tools in its collection programs. The changes have been happening since almost the[…]
Washington D.C. – Senator Al Franken presided over a hearing today in which lawmakers and technology experts discussed the National Security Administration’s surveillance practices, examining a proposed bill that would require that the U.S. spy agency carry out its operations in a more transparent fashion.
NIST made public a provisional copy of the government’s cybersecurity framework and says it will accept public comment on the draft for the next 45 days.