Browsing Tag: data breach

[img_assist|nid=10979|title=Paul Brodeur|desc=|link=none|align=right|width=100|height=100]We wrote yesterday about research by Paul Brodeur of Leviathan Security Group on security weaknesses that are built into Google’s Android mobile operating system. Brodeur was able to show, using a proof of concept application, that Android applications without any permissions can still access files used by other applications, including which applications are installed and a list of any readable files used by those applications. In this question and answer session, Brodeur corresponds with Threatpost about his ongoing work studying the Android operating system, and how a combination of loose application coding and insecure design makes Google’s Android a boon for advertisers and others who want to harvest data on mobile users.* 

Read more...

Categories: Data Breaches, Hacks

Pastebin.com could soon find itself on the wrong side of some of its most reliable traffic generators, namely, Anonymous, (what’s left of) LulzSec, and other hackers now that the site’s owner, Jeroen Vader, said he plans on hiring more staff to patrol the text-sharing site for “sensitive information,” according to a BBC report.

Read more...

Call it a “rocky start”: U.S. Ambassador to Russia Michael McFaul used his Twitter account to lash out at domestic news operation NTV, which he accused of hacking his e-mail account and cell phone in order to follow the Ambassador about town. The accusation has prompted a sharp response from critics in Russia.

Read more...

Categories: Data Breaches

The topic of this program is often how to prevent security issues and attacks, but the reality is that company’s need to understand attacks and how to respond to attacks after they happen. In this episode, Alex Horan of Core Security and Ted Julian of Co3 join Threatpost Editor Paul Roberts to discuss what happens after the breach.

Read more...