Category Archive for "Web Security"

Apple fixes iOS lock screen bypass that gives access to photos, contacts

admin

Apple has reportedly fixed a vulnerability that could have allowed hackers to bypass the passcode on iPhone 6s and 6s Plus running iOS 9.3.1 in order to access the address book and photos. The bypass technique was discovered by researchers…

Adobe to issue emergency patch for Flash vulnerability

admin

Adobe is working on an emergency patch for its Flash Player after attackers are reportedly exploiting a critical flaw. The vulnerability, CVE-2016-1019, affects Flash Player version 21.0.0.197 on Windows, Mac, Linux, and Chrome OS, according to an advisory published on Tuesday….

Server software poses soft target for ransomware

admin

An alternate method for infecting computers with ransomware signals a shift in tactics by cybercriminals that could put businesses at greater risk, according to Symantec. A type of ransomware called Samsam has been infecting organizations but is not installed in…

WhatsApp turns on end-to-end encryption for all

admin

Letting people communicate securely and privately should be a no-brainer, not a complicated process where users jump through hoops or pay for expensive tools. For more than a billion WhatsApp users around the world, that dream is now reality, as…

Inside job: What CIOs miss in preventing data leaks

admin

This week, I’m at a conference focused on helping CIOs help their organizations. The overwhelming issue is security. Email security, data leakage, and data loss/theft are all huge focuses — especially when the company is involved in the health care…

Denial Syndrome: Users don’t think they'll get hacked

admin

Most people say they care about their online security and privacy. Poll after poll confirm what one would expect: They don’t want their identities stolen, phones hacked, credit cards compromised or bank accounts drained. They don’t welcome government or anyone else conducting…

This startup uses math to show whether your network is safe

admin

How do you know your network is safe from attacks and failures? Veriflow, a startup with backing from the U.S. Defense Department, says it can make sure. Veriflow applies a practice called formal verification, used in preparing Mars missions and…

Digital certificates are helping deliver malware

admin

Digital certificates and malware go together like peanut butter and petroleum jelly — they can be sandwiched together easily, but the result is not exactly tasty or good for you. As you may know, digital certificates are used to cryptographically…

Google issues biggest Android security update yet

admin

With fixes for 39 vulnerabilities in Android, the April Nexus Security Bulletin is the largest security update from Google since the company began the monthly update process eight months ago. Google fixed 15 vulnerabilities rated as critical, 16 rated as…

HTTP compression continues to put encrypted communications at risk

admin

Security researchers have expanded and improved a three-year-old attack that exploits the compression mechanism used to speed up browsing in order to recover sensitive information from encrypted Web traffic. The attack, known as BREACH (Browser Reconnaissance and Exfiltration via Adaptive…

web tasarım