At the ToorCon San Diego conference, a CNN iReporter talks with security professionals about basic security issues and then see Marty Morrow escape from handcuffs without a key!
Browsing Category: Vulnerabilities
[img_assist|nid=1026|title=|desc=|link=none|align=right|width=115|height=115]It’s not just credit cards and debit cards
that are at risk of fraud: pre-paid gift cards can also easily be
cloned and stolen by cybercriminals, according to newly published
research [pdf] from U.K-based Corsaire.
Researchers scanning the internet for vulnerable embedded devices have
found nearly 21,0[img_assist|nid=901|title=|desc=|link=none|align=left|width=115|height=115]00 routers, webcams and VoIP products open to remote
attack, due to the fact that their administrative interfaces are
publicly viewable from anywhere on the internet and their owners have
failed to change the manufacturer’s default password. Read the full story [Wired/Kim Zetter]
[img_assist|nid=889|title=|desc=|link=none|align=right|width=115|height=115]Dennis Fisher and Ryan Naraine discuss the Evil Maid USB
attack, the Time Warner modem vulnerability and that old standby: the
Guest Editorial by Christofer Hoff[img_assist|nid=877|title=|desc=|link=none|align=left|width=115|height=115]There have been many disruptive innovations
in the history of modern computing, each of them in some way impacting
how we create, interact with, deliver, and consume information. The
platforms and mechanisms used to process, transport, and store our
information likewise endure change, some in subtle ways and others
If your cash [img_assist|nid=716|title=|desc=|link=none|align=left|width=100|height=100]card gets eaten by the automated-teller machine, it may not end up in the hands of a bank employee.European financial institutions are seeing a sharp rise in card “trapping,” where criminals use various tricks in order to capture and retrieve a person’s ATM card for fraudulent use. Read the full story [IDG News Service/Jeremy Kirk]
The Big Story podcast with Ryan Naraine – October 22, 2009[img_assist|nid=713|title=|desc=|link=none|align=right|width=115|height=115]Trident Risk Management’s Nick Selby joins the Big Story
podcast to discuss the latest news around Metasploit and Rapid7 and how this
affects issues around penetration testing and exploit creation and release.
[img_assist|nid=883|title=|desc=|link=none|align=left|width=115|height=115]There’s a rudimentary vulnerability in a cable modem/wireless router installed in tens of thousands of homes by Time Warner that could enable an attacker to get full access to the router quite easily.
Microsoft Windows 7 is on its way to[img_assist|nid=708|title=|desc=|link=none|align=right|width=115|height=115]morrow, and it is bringing with it a set of security features Microsoft hopes will appeal to enterprises.The Windows 7 security story has three main chapters that have received a fair amount of attention – DirectAccess, BitLocker To Go and AppLocker. With these, capabilities like Branchcache and enhancements to features like user account control (UAC), officials at Microsoft feel they are pushing out their most secure operating system yet. Read the full story [eWEEK/Brian Prince]
[img_assist|nid=686|title=|desc=|link=none|align=left|width=115|height=115]The WordPress blog software has been upgraded to version 2.8.5 to backport a number of security hardening changes to make WordPress-powered blogs more secure.Here’s a glimpse of some of the security fixes being pushed out: