Security news that informs and inspires

All Articles

2237 articles:

Simjacker Attack Exploits Deep-Seated Weakness in Phones

The newly disclosed Simjacker attack allows a remote attacker to track a mobile device by exploiting a weakness deep within many phones.

Mobile Security

Decipher Podcast: Parker Thompson

Dennis Fisher talks with Parker Thompson of Cyber Independent Testing Lab about the group's IoT security study.

Podcast

Attack on Power Utility Highlights Need for Layered Defense

The key takeaway from the NERC report about the attack against a US electric utility isn't that companies need to be patching, but that layered defense is still the best approach for keeping systems and networks safe.

Critical Infrastructure Security

NetCAT Attack Can Leak Data From Some Intel Processors

A new attack that exploits a weakness in the DDIO feature of some Intel chips can leak sensitive data, including SSH keystrokes.

Intel, Hardware

Mozilla Testing Firefox Private Network

A new Firefox Private Network extension provides protection on public networks.

Privacy, Mozilla

Decipher Podcast: Tanya Sam

Tanya Sam of TechSquare Labs joins Dennis Fisher to discuss her path to the Atlanta startup scene and what she's learned along the way.

Podcast

Exim Bug Allows Root Privileges

A flaw in the Exim MTA software can be exploited remotely to gain root privileges.

Vulnerability

Money for Nothing: Ransomware Plagues Local Governments

Ransomware infections have crippled local governments in several states recently, a trend that shows no signs of abating.

Ransomware

Firefox Now Blocks Third-Party Cookies by Default

Mozilla has added Enhanced Tracking Protection to Firefox to block tracking cookies in the browser by default.

Privacy, Mozilla

Modified Orcus and Revenge RATs Infesting Networks

Researchers have found modified versions of the Orcus and Revenge RATs being delivered through effective phishing campaigns.

Malware

Long-Running Attack Campaign Targeted iPhones

Researchers from Google Project Zero uncovered a multiyear campaign that targeted iPhones with sophisticated exploit chains delivered through hacked websites.

Apple, Ios

Disinformation Attacks Aren’t Just Against Elections

While disinformation is getting a lot of attention in security circles, the discussion primarily tends to be in the context of election security. However, hacking social media accounts, or creating fake accounts, to post false messages about a company is absolutely a disinformation campaign.

Disinformation, Twitter

Imperva Discloses Data Breach, Theft of Customer API Keys

Security firm Imperva says that API keys and SSL certificates for some of its Cloud WAF customers were exposed in a data breach.

Data Breaches

Attackers Targeting Vulnerability in Pulse Secure VPN

The CVE-2019-11510 vulnerability in Pulse Secure VPN is drawing considerable attention from attackers now that an exploit is publicly available.

Vpn

Encryption Experts Asked G7 to Set the Right Example

Encryption experts from around the world collaborated on an open letter to G7 leaders prior to the summit to not undermine encryption. The fact that the G7 leaders didn't release a statement supporting lawful access for law enforcement and intelligence agencies the way the G7 ministers did back in April is a victory of sorts.

Encryption